Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

ECDSA Validation List

This list identifies implementations that have been validated as conforming to the Elliptic Curve Digital Signature Algorithm (ECDSA), as specified in Federal Information Processing Standard (FIPS) 186-2 with Change Notice 1 and FIPS 186-4, using tests described in the (186-2) Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) and (186-4) Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS).

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of curve sizes providing less than 112 bits of security strength (P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation excluding use with protocols, is no longer approved.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, the use of RNGs specified in FIPS 186-2, [X9.31], and the 1998 version of [X9.62] as a prerequisite for validation testing is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
1595
11/9/2018
    1594
    11/9/2018
      1593Broadcom Corp.
      270 Innovation Drive
      San Jose, CA 95134
      United States

      Alfonso Ip
      Alfonso.ip@broadcom.com
      408-922-5624
      Fax: 408-922-8050

      PKA-ECDSA

      BCM5820X 1.0 (Firmware)


      ECDSA signature generation and verification.

        • ARM Cortex-A7
      11/9/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4646, DRBG #2452
      1592SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      (844) 436-2797

      CryptoComply Server Engine

      2.2


      CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

        • Intel Xeon E3 w/ CentOS 7
      11/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4699, DRBG #2498
      1591Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Kevin Micciche
      kevin.micciche@hpe.com
      404-648-0062

      ArubaOS Crypto Module

      ArubaOS 8.2 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Broadcom BCM47452
      11/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4697, DRBG #2481
      1590Ixia, a Keysight Business
      846 Higuera Street, Suite 2
      San Luis Obispo, CA 93401
      United States

      Fred Strelzoff
      fref.strelzoff@keysight.com
      (512) 600-5400

      Ixia Cryptographic Module

      1.0.1


      The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Core i7-3555LE w/ Linux 4.12.0
      11/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4693, DRBG #2493
      1589Ixia, a Keysight Business
      846 Higuera Street, Suite 2
      San Luis Obispo, CA 93401
      United States

      Fred Strelzoff
      fref.strelzoff@keysight.com
      (512) 600-5400

      Ixia Cryptographic Module for OpenSSL

      2.0.16


      The Ixia Cryptographic Module for OpenSSL is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Core i7-3555LE without PAA w/ Linux 4.12.0
        • Intel Core i7-3555LE with PAA w/ Linux 4.12.0
      11/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4692, DRBG #2492
      1588Socionext Inc.
      Nomura Shin-Yokohama Bldg.2-10-23 Shin-Yokohama
      Kohoku-ku, Yokohama, Kanagawa 222-0033
      Japan

      SoC Solution Engineering Dept. Custom SoC Solution Business

      Socionext Cryptographic Module

      XCZU9EG V01L02R01


      The Socionext Cryptographic module provides the cryptographic functionality found in Socionext Cryptographic products. It implements support for AES, DRBG, SHA2, RSA and ECDSA Digital Signature generation/verification.

        • ARM Cortex-A53 w/ Linux Kernel 4.11
      11/9/2018
      • ECDSA:
        • 186-4:
          • Signature Generation:
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4691, DRBG #2490
      1587Fortinet, Inc.
      16 Fitzgerald Road
      Ottawa, ON K2H 8R6
      Canada

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-2951

      Fortinet FortiMail SSL Cryptographic Library 6.0

      6.0 (Firmware)


      This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

        • Intel Xeon
      11/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Prerequisite: SHS #4271, DRBG #2050
      1586Lexmark International Inc.
      740 West New Circle Road
      Lexington, Kentucky 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Lexmark Crypto Core

      2.1


      Lexmark Crypto Core

        • Marvell 88PA6220 w/ Lexmark Linux (64-bit)
      11/2/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4689, DRBG #2487
      1585Lexmark International Inc.
      740 West New Circle Road
      Lexington, Kentucky 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Lexmark Crypto Core

      2.1


      Lexmark Crypto Core

        • Marvell 88PA6270 w/ Lexmark Linux (64-bit)
      11/2/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4688, DRBG #2486
      1584Lexmark International Inc.
      740 West New Circle Road
      Lexington, Kentucky 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Lexmark Crypto Core

      2.1


      Lexmark Crypto Core

        • Marvell 88PA6220 w/ Lexmark Linux (32-bit)
      11/2/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4687, DRBG #2485
      1583Lexmark International Inc.
      740 West New Circle Road
      Lexington, Kentucky 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Lexmark Crypto Core

      2.1


      Lexmark Crypto Core

        • Marvell 88PA6270 w/ Lexmark Linux (32-bit)
      11/2/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4686, DRBG #2484
      1582SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Windows Server 2012 R2
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4684, DRBG #2483
      1581SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Red Hat Enterprise Linux 7
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4683, DRBG #2482
      1580Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Kevin Micciche
      kevin.micciche@hpe.com
      404-648-0062

      ArubaOS OpenSSL Module

      ArubaOS 8.2 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • NXP QorIQ P10XX Series
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #2440, DRBG #528
      1579Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Kevin Micciche
      kevin.micciche@hpe.com
      404-648-0062

      ArubaOS OpenSSL Module

      ArubaOS 8.2 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Broadcom BCM47452
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4682, DRBG #2481
      1578Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Kevin Micciche
      kevin.micciche@hpe.com
      404-648-0062

      ArubaOS OpenSSL Module

      ArubaOS 8.2 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8068
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3300, DRBG #1188
      1577Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Kevin Micciche
      kevin.micciche@hpe.com
      404-648-0062

      ArubaOS OpenSSL Module

      ArubaOS 8.2 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Broadcom BCM53014A
      11/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #2629, DRBG #660
      1576WISeKey
      Rue de la carrière de Bachasson
      Arteparc de Bachasson, Bâtiment A
      Meyreuil, Bouches du Rhone F-13590
      France

      Dupaquis
      vdupaquis@wisekey.com
      +33 442370081

      Benchaalal
      obenchaalal@wisekey.com
      +33 442370025

      Vault-IC 407

      1.0.1 (Firmware)


      The VaultIC407 ASSPs designed to secure various systems against counterfeiting, cloning or identity theft. It is a hardware security module that can be used in many applications such as IP protection, access control or hardware protection.

        • High-performance, Low Enhanced RISC Architecure
      10/26/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4659, DRBG #2465
      1575Palo Alto Networks
      3000 Tannery Way
      Santa Clara, California 95054
      USA

      Amir Shahhosseini
      ashahhosse@paloaltonetworks.com
      408-753-4000

      Jake Bajic
      jbajic@paloaltonetworks.com
      408-753-4000

      Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

      8.1


      The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

        • Intel Multi Core Xeon w/ AWS EC2
        • Intel Multi Core Xeon w/ Hyper-V 2012 r2
        • Intel Multi Core Xeon w/ Google Cloud Platform
        • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
        • Intel Multi Core Xeon w/ VMware ESXi 5.5
        • Intel Multi Core Xeon w/ Azure
      10/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4658, DRBG #2464
      1574Cisco Systems, Inc.
      170 W. Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Adaptive Security Appliance (ASA) OS

      9.6


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Xeon E-Series w/ ESXi 5.5 w/ n/a
      10/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3579, DRBG #1386
      1573Cisco Systems, Inc.
      170 W. Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Adaptive Security Appliance (ASA) OS

      9.6


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Xeon E5 w/ ESXi 5.5 w/ n/a
      10/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3579, DRBG #1386
      1572Totemo AG
      Freihofstrasse 22
      Kuesnacht, Zuerich 8700
      Switzerland

      Marcel Mock
      marcel.mock@totemo.com
      +41 (0) 44 914 9900

      Totemo Cryptographic Module (TCM)

      3.0


      The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites.

        • Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
      10/19/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4657, DRBG #2463
      1571NETSCOUT Systems, Inc.
      310 Littleton Road
      Westford, MA 01886
      USA

      Steve Swidrak
      Stephen.Swidrak@netscout.com

      NetScout FIPS Object Module

      1.0


      This cryptographic library provides cryptographic services to NETSCOUT products.

        • Intel Xeon Gold w/ Linux 3.10
      10/19/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4656, DRBG #2462
      1570Palo Alto Networks
      3000 Tannery Way
      Santa Clara, California 95054
      USA

      Amir Shahhosseini
      ashahhosse@paloaltonetworks.com
      408-753-4000

      Jake Bajic
      jbajic@paloaltonetworks.com
      408-753-4000

      Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

      8.1 (Firmware)


      The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

        • Intel i7
        • Intel Multi Core Xeon
        • Intel Pentium
        • Intel Celeron
        • Cavium Octeon MIPS64
        • Cavium MIPS64
      10/19/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4641, DRBG #2451
      1569Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • AMD Ryzen5 w/ Windows 2016 64 bits
      10/12/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4463, DRBG #2215
      1568Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Windows 10 rs3 32 bits
      10/12/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4473, DRBG #2219
      1567Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A12 Bionic w/ iOS 12
      10/12/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4638, DRBG #2449
      1566Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 GnuTLS C Implementation

      R7-2.0.0


      GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      10/12/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4634, DRBG #2437
      1565Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); Virtual TPM Implementations

      10.0.17134


      The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise April 2018 Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Core on Hyper-V on Windows Server 2016 (x64)
        • Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise April 2018 Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise April 2018 Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Home April 2018 Update (x86)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Education April 2018 Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Enterprise April 2018 Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter Core on Hyper-V on Windows Server (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Standard Core on Hyper-V on Windows Server (x64)
        • Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go w/ Windows 10 Pro April 2018 Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise April 2018 Update (x64)
      10/12/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Prerequisite: SHS #4633, DRBG #2436
      1564Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); MsBignum Cryptographic Implementations

      10.0.17134


      The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

        • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
        • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
        • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
        • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
        • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
      10/12/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4633, DRBG #2435
      1563Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); SymCrypt Cryptographic Implementations

      10.0.17134


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
        • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
        • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
        • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
        • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
        • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
        • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
        • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
      10/5/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4633, DRBG #2435
      1562Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Windows 10 rs3 64 bits
      10/5/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4462, DRBG #2214
      1561Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Mac OS 10.13
      10/5/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4459, SHS #4461, DRBG #2211
      1560Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ CentOS 7.4 64 bits
      10/5/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4460, DRBG #2211, DRBG #2212
      1559Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
      10/5/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4459, DRBG #2211
      1558Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      Gemalto FIPS Object Module

      2.1.0


      The Gemalto FIPS Object Module is a hardened version of the general purpose OpenSSL FIPS Object module designed to provide FIPS 140-2 validated cryptographic functionality.

        • Qualcomm APQ8064 (ARMv7) w/ Android 4.4
        • Qualcomm MSM8996pro Snapdragon 821 (ARMv8) w/ Android 7.1
        • Apple A6 (ARMv7) w/ IOS 10.3
        • Qualcomm MSM8998 Snapdragon 835 (ARMv8) w/ Android 8.1
        • Apple A11 (ARMv8) w/ IOS 11.4
        • Samsung Exynos7420 (ARMv8) w/ Android 5.1
        • Qualcomm MSM8994 Snapdragon 810(ARMv8) w/ Android 6.0
        • Qualcomm APQ8064 (ARMv7) without PAA w/ Android 4.4
        • Apple A8 (ARMv8) w/ IOS 9.3
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4615, DRBG #2407
      1557Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel Xeon w/ macOS Mojave 10.14
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4614, DRBG #2397
      1556Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel CoreM w/ macOS Mojave 10.14
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4613, DRBG #2396
      1555Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel i7 w/ macOS Mojave 10.14
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4612, DRBG #2395
      1554Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel i9 w/ macOS Mojave 10.14
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4611, DRBG #2394
      1553Apple Inc.
      One Apple Park Way
      MS: 927-1CPS
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Stephanie Motre Martin
      smotre@apple.com
      (408)750-6235
      Fax: (866)315-1954

      Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Generic)

      9.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel i5 w/ macOS Mojave 10.14
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4610, DRBG #2393
      1552Autotalks
      4 Meir Ariel St. Grand Netter, Building, POB 3846
      Netanya 40593
      Israel

      Ron Ioszpe
      ron.ioszpe@auto-talks.com
      +972-9-886-5300
      Fax: +972-9-886-5372

      Guy Fried
      guy.fried@auto-talks.com
      +972-9-886-5300
      Fax: +972-9-886-5327

      PKA

      2.1.2 (Firmware)


      Autotalks Hardware Security Module provide a FIPS 140-2 Level 3 certified, hardened, tamper-resistant environment for secure cryptographic processing needed for Automotive Vehicle-to-Everything communication systems including: ECC Public Key cryptography, Symmetric key cryptography, Key protection, TRNG/DRBG

        • Simulator: Cadence NC-Verilog
      9/28/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-224 SHA: SHA-224
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-224 SHA: SHA-224
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4607, DRBG #2390
      1551Curtiss-Wright Controls, Inc.
      2600 Paramount Place, Suite 200
      Fairborn, OH 45324
      USA

      Paul Davis
      pdavis@curtisswright.com
      937-610-5421
      Fax: 937-252-1480

      Rich Langley
      rlangley@curtisswright.com
      937-610-5455
      Fax: 937-252-1465

      Curtiss-Wright Crypto Firmware

      1.00 (Firmware)


      The Crypto Firmware uses 256-bit encryption keys and provides key management for Data Encryption Keys (DEKs), including two-factor user authentication and secure key import, generation, storage, and zeroization. The Crypto Firmware provides maximum data-at-rest security in commercial and military applications.

        • NXP (Phillips) ARM7 Processor P/N LPC2368FBD100
      9/21/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4590
      1550ICU Medical
      600 N. Field Drive
      Lake Forest, IL 60045
      USA

      Chaitanya Srinivasamurthy
      Chaitanya.srinivasamurthy@icumed.com
      +1 224-706-2518

      Mark Rohlwing
      Mark.Rohlwing@icumed.com
      +1 480-570-2097

      ICU Medical Lifecare PCA Crypto Library

      lifecare-pca-fips-2.0.16-trunk CL# 649181 (Firmware)


      ICU Medical Lifecare PCA Crypto Library provides secure communication for the Lifecare PCA Infusion Pumps.

        • Net Silicon NS7520 ARM7
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4588, DRBG #2361
      1549MobileIron, Inc
      410 East Middlefield Road
      Mountain View, CA 94043
      USA

      Anthony Ungerman
      ps-certifications <ps-certifications@mobileiron.co
      +1.877.819.3451
      Fax: +1.650.919.8006

      MobileIron Mobile@Work client for Android

      OpenSSL 1.0.2h, FIPS 2.0.12


      General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography

        • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy S7 w/ Android 7
        • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy Note 8 w/ Android 7
        • Qualcomm SDM845 Snapdragon 845 on Samsung Galaxy S9+ w/ Android 8
        • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy Tab S3 w/ Android 7
        • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy S8 w/ Android 8
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4570, DRBG #2311
      1548F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      Eric Raisters
      E.Raisters@f5.com
      206-272-7580

      Cryptographic Module for BIG-IP with AES and SHA assembler

      13.1.1


      Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

        • Intel (R) Xeon (R) E5-2697 w/ BIG-IP 13.1.1 on VMware ESXi 6.5
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4568, DRBG #2309
      1547F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      Eric Raisters
      206-272-7580
      206-272-7580

      Cryptographic Module for BIG-IP with AES and SHA assembler

      13.1.1


      Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

        • Intel (R) Xeon(R) E5-2660 w/ BIG-IP 13.1.1 on Hyper-V 10.0 on Windows Server 2016
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4566, DRBG #2307
      1546Beijing Sansec Technology Development Co., Ltd
      26F No.3 Building, Triumph Center, No.170 Beiyuan Road
      Chaoyang District
      Beijing, Beijing 100101
      China

      Yongxin Xu
      xuyongxin@sansec.com.cn
      +86 186 6080 5090

      Sansec HSM - CSM Library

      1.0.12 (Firmware)


      The CSM library implements cryptographic algorithms for data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), and random number generation. The CMS library is part of the Sansec Hardware Security Module (HSM).

        • Intel G3260
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4564, DRBG #2306
      1545Microsec PTE LTD
      83B Rowell Road
      Singapore, Singapore 208015
      Singapore

      Magzhan Ikram
      mikram@usec.io
      69314227

      Vishram Mishra
      Vishram@usec.io
      69314227

      MICROSEC_DSA_ECDSA_P-256

      1.00 (Firmware)


      ECC digital signature module is used as the cryptographic block for data integrity on a secure ecosystem for IOT and sensor network.

        • AVR - ATMega2560
        • ARM Cortex M0 - ATSAMD21g18a
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256
          • Signature Generation:
            • P-256 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4563, DRBG #2305
      1544WISeKey
      Rue de la carrière de Bachasson
      Arteparc de Bachasson, Bâtiment A
      Meyreuil, Bouches du Rhone F-13590
      France

      Dupaquis
      vdupaquis@wisekey.com
      +33 442370081

      Benchaalal
      obenchaalal@wisekey.com
      +33 442370025

      Vault-IC 420/460

      1.0 (Firmware)


      The VaultIC420 or VaultIC460 are ASSPs designed to secure various systems against counterfeiting, cloning or identity theft. It is a hardware security module that can be used in many applications such as IP protection, access control or hardware protection.

        • High-performance, Low-power Enhanced RISC architecture
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4562, DRBG #2304
      1543Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
      312 Kings Way
      South Melbourne, Victoria 3025
      Australia

      John Weston
      john.weston@senetas.com
      +61 3 9868 4555
      Fax: +61 3 9821 4899

      CN6000 Series Common Crypto Library

      5.0.1 (Firmware)


      The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

        • Intel ATOM
      9/21/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4561, DRBG #2303
      1542Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
      312 Kings Way
      South Melbourne, Victoria 3025
      Australia

      John Weston
      john.weston@senetas.com
      +61 3 9868 4555
      Fax: +61 3 9821 4899

      CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

      5.0.1 (Firmware)


      The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

        • ARM Cortex A9
      9/14/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4560, DRBG #2302
      1541Berryville Holdings, LLC
      2465 Centerville Road
      #J17-812
      Herndon, VA 20171
      USA

      Cael Jacobs
      cael@bvhllc.com
      (703) 782-9840

      Chava Jurado
      chava@bvhllc.com
      (703) 782-9840

      Cryptographic Module for Fognigma

      2.0.16


      The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

        • ARM Cortex-A53 without PAA w/ Raspbian Stretch
        • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
        • ARM Cortex-A53 with PAA w/ Raspbian Stretch
        • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
      9/14/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4559, DRBG #2301
      1540Cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Cavium Octeon CN7240
      9/14/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4555, DRBG #2299
      1539Cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

        • N/A
      9/14/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4554, DRBG #2298
      1538Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MA 01886
      USA

      Adam Elshama
      aelshama@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Keith Conger
      KConger@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Sonus Cryptographic Library

      3.1 (Firmware)


      Sonus Session Border Controller FIPS-validated cryptographic software module

        • Intel Xeon (Ivy Bridge)
      9/14/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4550, DRBG #2295
      1537Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2609
      9/7/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4546, DRBG #2294
      1536Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2680
      9/7/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4545, DRBG #2293
      1535NETSCOUT Systems, Inc.
      310 Littleton Road
      Westford, MA 01886
      USA

      Steve Swidrak
      Stephen.Swidrak@netscout.com

      NetScout FIPS Object Module

      1.0


      This cryptographic library provides cryptographic services to NETSCOUT products.

        • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
        • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
        • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
        • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
      9/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4543, DRBG #2291
      1534Klas Telecom
      1101 30th Street NW, Suite 500
      Washington, DC 20007
      USA

      Toby Stidham
      toby.stidham@klastelecom.com
      352-406-0560

      Cian Masterson
      cian.masterson@klastelecom.com

      OpenSSL 1.0.1h without a FIPS object module

      1.0.1h


      Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

        • Marvell Prestera 98DX8212 w/ Linux 3.10.70
      9/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4542, DRBG #2290
      1533KeyPair Consulting Inc.
      846 Higuera Street
      Suite 2
      San Luis Obispo, CA 93401
      USA

      Mark Minnoch
      mark@keypair.us
      805-316-5024

      Steve Weymann
      steve@keypair.us
      805-316-5024

      KeyPair Cryptographic Module for OpenSSL

      2.0.16


      The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
      9/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4541, DRBG #2289
      1532Extreme Networks
      6480 Via Del Oro
      San Jose, CA 95119
      USA

      Sunil Chitnis
      schitnis@extremenetworks.com
      408-352-2407

      Joey Salanga
      jsalanga@extremenetworks.com
      408-352-2439

      Extreme FIPS Cryptographic Library

      2.1 (Firmware)


      The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

        • Freescale E500mc
      9/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4540, DRBG #2288
      1531Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Cavium OCTEON II CN6xxx w/ SAOS 6.17
      8/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-384 SHA: SHA-1, SHA-256, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #4539, DRBG #2287
      1530FP InovoLabs GmbH
      Prenzlauer Promenade 28
      Berlin, Berlin 13089
      Germany

      Janos Laube
      j.laube@francotyp.com
      +49 30 220660 397

      Hasbi Kabacaoglu
      h.kabacaoglu@francotyp.com
      +49 30 220660 656

      NpsdCrypto

      N-PSD rev. 04 1.0 (Firmware)


      nRevenector Cryptographic Library

        • Maxim MAX32590
      8/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
          • Signature Verification:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4538, DRBG #2286
      1529Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Ahmer Sabri
      ahmer@google.com
      201-341-1408

      Titan Cryptographic Library

      1.0 (Firmware)


      Firmware implementation of standard algorithms written in C and assembly.

        • ARM SC300 processor, with Dcrypto Coprocessor
      8/27/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4537
      1528Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 NSS without AES-NI

      R7-2.0.0


      Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      8/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4535, DRBG #2284
      1527Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Cryptographic Library

      1.0 (Firmware)


      The SafeNet Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/17/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Prerequisite: DRBG #2283
      1526Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Accelerated Cryptographic Library

      1.0 (Firmware)


      The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/17/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4533, DRBG #2283
      1525ECI Telecom Ltd
      30 Hasivim Street
      Petach Tikvah 49517
      Israel

      Milind Barve
      milind.barve@ecitele.com
      +91-80-67122000
      Fax: +91-80-67122001

      ECI (OS) Crypto Library

      2.0.16


      ECI (OS) Crypto Library

        • PowerPC w/ Linux
      8/17/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4532, DRBG #2282
      1524SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Windows Server 2012 R2
        • Intel i7 w/ Red Hat Enterprise Linux 7
      8/17/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4531, DRBG #2281
      1523IBM Corporation
      1701 North Street
      Endicott, NY 13760
      USA

      AIX FIPS Security
      aixfips@in.ibm.com

      AIX FIPS Crypto Module for OpenSSL

      2.0.16


      The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

        • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
      8/17/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4530, DRBG #2280
      1522Blue Cedar
      325 Pacific Avenue
      San Francisco, CA 94111
      USA

      FIPS Admin
      fips@bluecedar.com
      415-329-0401

      Blue Cedar Cryptographic Module

      2.0.16


      The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
        • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
      8/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4526, DRBG #2277
      1521Q Core Medical Ltd.
      29 Yad Harutsim St.
      Netanya 4250529
      Israel

      Nimrod Schweitzer
      nimrod.schweitzer@qcore.com
      +972-73-2388839
      Fax: +972-73-2388800

      Lee Aydelotte
      laydelotte@silexamerica.com
      801-676-8673
      Fax: 714-258-0730

      QCore OpenSSL FIPS Object Module 2.0.9

      2.0.9


      QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

        • NXP i.MX280 ARM w/ Linux 2.6.35
      8/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4525, DRBG #2276
      1520Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      66005f41fbc3529ffe8d007708756720529da20d


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • POWER9 without PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      8/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4509, DRBG #2253
      1519BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • ARMv8 w/ Android 8.1.2 on Venturi K502 Android tablet manufactured by Infomark
      8/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4506, DRBG #2251
      1518BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
      8/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4505, DRBG #2250
      1517Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 XLP-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Broadcom XLP432
      8/2/2018
      • ECDSA:
        • 186-4:
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
      1516Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 OpenSSL-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4502, DRBG #2248
      1515Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4499, DRBG #2246
      1514Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4498, DRBG #2245
      1513Toshiba Information Systems (UK) Limited
      Toshiba Court,
      Weybridge Business Park
      Addlestone Road
      Weybridge, Surrey KT15 2UL
      United Kingdom

      Simon Lawton
      Simon.Lawton@Toshiba.co.uk
      +44 07970 083133

      Peter Hewson
      Peter.Hewson@Toshiba.co.uk
      +44 07881 096666

      Toshiba GB SMIP Communications Hub SKU 7-12

      12.13 (Firmware)


      A secure messaging gateway between cellular or mesh wide-area networks and dual band (2.4GHz and sub-GHz) ZigBee home area networks. Part of GB smart metering deployment for energy meter control and data messages exchange between energy supplier or DNOs and customer metering and display devices.

        • ARM 11 core, version 958-B24
      7/27/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4497
      1512Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      3218c1db82718a54e4d41de493d006eaa3ba445c


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • POWER9 without PAA w/ Ubuntu Linux 18.04
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4496, DRBG #2244
      1511Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4491, DRBG #2236
      1510Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4490, DRBG #2235
      1509Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4489, DRBG #2234
      1508Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4488, DRBG #2233
      1507Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4487, DRBG #2232
      1506Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4480, DRBG #2225
      1505Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine using the EYL QRNG

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4478, DRBG #2224
      1504Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      7/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4477, DRBG #2223
      1503Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certification Team
      SecurityCertfications@gemalto.com

      ProtectServer Internal Express Cryptographic Library

      5 (Firmware)


      The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

        • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
      7/20/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4476, DRBG #1704
      1502Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform EC 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4475, DRBG #2221
      1501HP Inc.
      11311 Chinden Blvd
      Boise, Idaho 83714-0021
      USA

      Gerardo Colunga
      gerardo.del.colunga@hp.com
      208-333-5607

      Chris Gunning
      chris.gunning@hp.com
      208-333-6785

      HP FutureSmart QuickSec

      5.1 (Firmware)


      HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

        • Arm Cortex-A8
      7/20/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Prerequisite: SHS #4474, DRBG #2220
      1500Curtiss-Wright Controls, Inc.
      2600 Paramount Place, Suite 200
      Fairborn, OH 45324
      USA

      Paul Davis
      pdavis@curtisswright.com
      937-252-5601 x 1363
      Fax: 937-252-2729

      Rich Langley
      rlangley@curtisswright.com
      937-610-5455
      Fax: 937-252-1465

      Curtiss-Wright Controls SW OpenSSL

      6.0


      The OpenSSL software implementation provides cryptographic functionality supporting the CentOS operating system.

        • Intel Atom E3845 w/ CentOS 7.5
        • Intel Core i5-4402E w/ CentOS 7.5
      7/20/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4471
      1499Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4465, DRBG #2216
      1498Elster GmbH
      Strothweg 1
      Lotte (Buren) 49504
      Germany

      Michael Habermann
      michael.habermann@honeywell.com
      +49-541-1214-215
      Fax: +49-541-1214-595

      Markus Bölter
      markus.boelter@honeywell.com
      +49-541-1214-114
      Fax: +49-541-1214-595

      elster_cv

      02.02.01 (Firmware)


      elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

        • STM32L152RE
      7/20/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-256 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4458, DRBG #2210
      1497Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0 (Firmware)


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • Intel Atom C Series
        • P2020
        • P2041
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4457, DRBG #2209
      1496SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4455, DRBG #2207
      1495Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat OpenSSL (64bit)

      5.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4450, DRBG #2199
      1494Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat NSS Softoken (64bit)

      5.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4449, DRBG #2198
      1493Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Chunsheng Xie
      chunsheng.xie@gigamon.com

      Cavium OpenSSL Library

      1.0.2d (Firmware)


      The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

        • Cavium CN6880
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #2023, DRBG #296
      1492Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • P2020 w/ CentOS 5.8
        • P2041 w/ CentOS 5.8
        • Intel Atom C Series w/ CentOS 6.6
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4447, DRBG #2196
      1491Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Allen Ting
      yting@juniper.net
      408-858-5008

      Mounir Hahad
      mhahad@juniper.net

      CryptoCore

      1.0


      Cryptographic module to support the cryptographic functionalities for Juniper products.

        • Intel Core i5 w/ Ubuntu Linux 14.04
        • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
        • Intel Xeon E5 family w/ Ubuntu Linux 14.04
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4446, DRBG #2195
      1490BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
        • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
        • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
        • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4445, DRBG #2194
      1489Infosec Global Inc.
      2225 Sheppard Avenue East
      Suite 1402
      Toronto, Ontario M2J 5C2
      Canada

      Brian Neill
      brian.neill@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      Ian Laidlaw
      ian.laidlaw@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      AgileSec FIPS Provider 1.0

      1.0


      AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Core i5 CPU with AES-NI w/ OSX 10.12
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Intel Core i5 CPU without AES-NI w/ OSX 10.12
        • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
      7/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4441, DRBG #2192
      1488Accellion, Inc.
      1804 Embarcadero Road
      Suite 200
      Palo Alto, Ca 94303
      USA

      Frank Balonis
      frank.balonis@accellion.com
      650-485-4300

      Sim Han Seah
      hanseah@accellion.com
      +65 6244 5678

      Accellion Cryptographic Module

      2.0.16


      The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ CentOS 6
        • Intel Xeon E5 with PAA w/ CentOS 6
      7/6/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4440, DRBG #2191
      1487SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
      7/6/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4439, DRBG #2190
      1486Virtual Instruments
      2331 Zanker Road
      San Jose, CA 95131
      USA

      Susanta Pattanayak
      Susanta.pattanayak@virtualinstruments.com
      +1 408 579 4000

      Jay Nitikman
      Jay.nitikman@virtualinstruments.com
      +1 408 579 4000

      Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

      v5.7 (Firmware)


      The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

        • Intel Broadwell Xeon without AES-NI
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4436, DRBG #2189
      1485Cisco Systems, Inc.
      170 W. Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Adaptive Security Appliance (ASA)

      9.6


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4435, DRBG #2188
      1484Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Ingrid Barker
      ibarker@juniper.net

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E312xx Sandy Bridge
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4432, DRBG #2184
      1483Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4431, DRBG #2183
      1482Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (3305)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon E5
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4424, DRBG #2181
      1481Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (2101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon D
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4423, DRBG #2180
      1480Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (1101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Pentium D
      6/29/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4422, DRBG #2179
      1479Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1-S4 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      6/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4421, DRBG #2177
      1478Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-OpenSSL

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4409, DRBG #2169
      1477Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - OpenSSL

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4416, DRBG #2173
      1476Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 MX: MS MPC-XLP

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Broadcom XLP832
      6/22/2018
      • ECDSA:
        • 186-4:
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4415
      1475Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 MX: MS MPC - XLP

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Broadcom XLP832
      6/15/2018
      • ECDSA:
        • 186-4:
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4410
      1474Silvus Technologies
      10990 Wilshire Blvd.
      STE 1500
      Los Angeles, CA 90024
      USA

      Ajit Warrier
      ajit@silvustechnologies.com
      310-479-3333 ext 41
      Fax: 310-479-2225

      Weijun Zhu
      weijun@silvustechnologies.com
      310-479-3333 ext 27
      Fax: 310-479-2225

      Silvus Crypto Module

      3.15.1 (Firmware)


      The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

        • Xilinx Zynq-7000
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-384
            • P-384 SHA: SHA-1, SHA-384
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-384
            • P-384 SHA: SHA-1, SHA-384
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4406, DRBG #2167
      1473CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Windows

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4404, DRBG #2162
      1472CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Linux

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4403, DRBG #2161
      1471Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4402, DRBG #2160
      1470Trend Micro Inc.
      11305 Alterra Parkway
      Austin, TX 78758
      USA

      Paul Tucker
      paul_tucker@trendmicro.com
      512-633-7945

      Trend Micro, TippingPoint Crypto Core OpenSSL

      2.0.13


      The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

        • Intel Core i3 without AES-NI w/ Linux 4.4
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
        • Intel Xeon E5 with AES-NI w/ Linux 4.4
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4401, DRBG #2159
      1469Arista Networks Inc.
      5453 Great America Pkwy
      Santa Clara, CA 95054
      USA

      Richard Whitney
      rw@arista.com
      703-627-6092
      Fax: 408-538-8920

      Ethan Rahn
      erahn@arista.com
      408-547-5825

      EOS MACsec Hybrid Firmware v1.0

      1.0 (Firmware)


      The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

        • Intel Xeon E3
        • AMD GX Series
        • Intel Pentium B9
        • Intel Xeon D-1500
        • AMD GE Series
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4399, DRBG #2158
      1468Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-XLP

      Junos OS 18.1R1 (Firmware)


      Juniper MX and EX9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Broadcom XLP832
      6/15/2018
      • ECDSA:
        • 186-4:
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4397, DRBG #2147
      1467ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      OpenSSL Algorithms

      1.0.2m EBEM Patch 1 (Firmware)


      OpenSSL algorithms used by the OpenSSH and NetSNMP modules to provide security for modem configuration and monitoring.

        • IBM PowerPC 405GPr
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4394, DRBG #2154
      1466ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      EbemCrypto

      13 (Firmware)


      Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat's Enhanced Bandwidth Efficient Modem (EBEM).

        • IBM PowerPC 405GPr
      6/15/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4393, DRBG #2154
      1465Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • PPCe500
        • Intel Xeon w/ ESXI 6.0
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Prerequisite: SHS #4392, DRBG #2153
      1464Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4391, DRBG #2151
      1463Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Brian Wood
      be.wood@samsung.com
      +1-973-440-9125

      Samsung BoringSSL Cryptographic Module

      v1.2.1


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Qualcomm SDM845 w/ Android 8.1
        • Samsung Electronics Exynos 9810 w/ Android 8.1
        • Qualcomm MSM8998 w/ Android 8.1
        • Qualcomm SDM450 w/ Android 8.1
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4389, DRBG #2149
      1462Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-OpenSSL

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4387, DRBG #2147
      1461Futurex
      864 Old Boerne Road
      Bulverde, TX 78163
      USA

      Futurex Security Certifications
      certifications@futurex.com
      830-980-9782

      Futurex Cryptographic Engine

      6.2.0.1 (Firmware)


      The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

        • TI AM3352
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4384, DRBG #2145
      1460SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5 for TZ, NSA and SuperMassive

      6.5.2 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN62XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon II (CN68XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon III (CN71XX)
      6/8/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4383, DRBG #2144
      1459Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-COS

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      6/1/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4369, DRBG #2134
      1458Juniper Networks, Inc
      1133 Innovation Way
      Sunnyvale, California 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 QFX10K-OpenSSL

      Junos OS 18.1R1 (Firmware)


      The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

        • Intel Xeon E3
      6/1/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4381, DRBG #2142
      1457REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
      6/1/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4377, DRBG #2140
      1456Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 QuickSec

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4376, DRBG #2139
      1455Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 OpenSSL

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4374, DRBG #2138
      1454KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4373, DRBG #2137
      1453Hypersecu Information System Inc
      #206-6191 Westminster Hwy
      Richmond, BC V7C 4V4
      Canada

      James Li
      james@hypersecu.com
      (604) 279-2000
      Fax: (604) 272-1233

      HYP ALG Library

      V1.0 (Firmware)


      The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

        • HSC32K1
      5/25/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
          • Prerequisite: SHS #4370, DRBG #2135
      1452Cisco Systems, Inc.
      170 W Tasman Dr
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      tbd

      CiscoSSL FIPS Object Module

      6.0


      The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

        • Apple A10 w/ iOS 11.x
      5/25/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4357, DRBG #2121
      1451wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      4.0


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4365, DRBG #2131
      1450IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      845-435-5538

      William Santiago
      wsf1@us.ibm.com
      845-435-9265

      Miniboot 6.63 with 00CW683

      Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


      Miniboot Implemented Algorithms with hardware acceleration

        • IBM PowerPC 405
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3957, DRBG #2130
      1449Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Petra Manche
      +44 1189 245470

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle OpenSSL FIPS Object Module

      OpenSSL_2.0.13_OracleFIPS_1.0


      Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

        • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
        • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
        • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
        • SPARC S7 with PAA w/ Oracle Solaris 11.4
        • SPARC S7 without PAA w/ Oracle Solaris 11.4
        • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
        • Intel Xeon E5 with PAA w/ Solaris 11.4
        • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
        • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4364, DRBG #2129
      1448Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      UnBound EKM Cryptographic Module

      2.0.1801.21683


      This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Prerequisite: SHS #4362, DRBG #2126
      1447Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      OpenSSL

      FIPS 2.0.16


      This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-224 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4362, DRBG #2126
      1446Splunk, Inc.
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Robert Truesdell
      rtruesdell@splunk.com
      412.913.8242

      Splunk Phantom Cryptographic Library

      1.0


      The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

        • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
        • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4361, DRBG #2125
      1445Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4360, DRBG #2124
      1444Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

        • n/a
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4359, DRBG #2123
      1443Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4358, DRBG #2122
      1442Cohesity, Inc.
      300 Park Ave
      Suite 800
      San Jose, CA 95110
      USA

      Vivek Agarwal
      vivek@cohesity.com
      +1 (415) 690-7805

      Cohesity OpenSSL FIPS Object Module

      1.0.2


      The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

        • Intel Xeon with AES-NI w/ CentOS 7
        • Intel Xeon without AES-NI w/ CentOS 7
      5/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4353, DRBG #2117
      1441Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      +1 (628)-400-2043

      SDKMS Crypto Library

      1.0.0 (Firmware)


      Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

        • Intel® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
      5/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4241, DRBG #2115
      1440Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Intel Xeon D-1500 w/ SAOS 8.6.1
        • AARCH64(arm) w/ SAOS 6.17
        • Cavium 52xx w/ SAOS 6.17
        • ARMv7 w/ SAOS 6.17
      5/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #4350, DRBG #2114
      1439LG Electronics, Inc.
      20 Yoido-dong
      Youngdungpo-gu
      Seoul 152-721
      Republic of Korea

      Donghoon Shin
      hoon.shin@lge.com
      82-10-2280-4056

      LG BoringSSL

      3.0


      General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

        • Snapdragon 845 (SDM845) w/ Android 8.0
        • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
        • Snapdragon 835 (MSM8998) w/ Android 8.0
      5/10/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4348, DRBG #2112
      1438Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - SRX5600 - HW-Authentec

      XLP832 17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Broadcom XLP832 accelerator
      5/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4288, DRBG #2060
      1437Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - SRX550 - HW-Authentec

      CN6335 17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon II (CN6335)
      5/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4288, DRBG #2060
      1436Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - SRX345 - HW-Authentec

      CN7130 17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7130)
      5/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4288, DRBG #2060
      1435Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - SRX320 - HW-Authentec

      CN7020 17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
      5/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4288, DRBG #2060
      1434INFINIDAT
      500 Totten Pond Road
      Waltham, MA 02451
      USA

      David Hebert
      davidh@infinidat.com
      +1 860-214-5666

      Steve Sullivan
      steves@infinidat.com
      +1 781-264-1544

      INFINIDAT Cryptographic Module (libcrypto)

      1.0.2k


      The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

        • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
      5/4/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4344, DRBG #2109
      1433Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • ECDSA:
        • 186-4:
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4339
      1432Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM SSL Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4338
      1431Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-1-01 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in sensor and access point.

        • ARMv7
      5/3/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256
          • Prerequisite: SHS #4165, DRBG #1936
      1430Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      5/3/2018
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
          • Prerequisite: SHS #4270, DRBG #2049
      1429D'Crypt Pte Ltd
      28 Sin Ming Lane
      #06-133 Midview City
      Singapore, Singapore 573953
      Singapore

      Sales & Marketing
      marketing@d-crypt.com
      (65) 6933-1800
      Fax: (65) 6684-5142

      Quek Gim Chye
      fips@d-crypt.com
      (65) 6933-1823
      Fax: (65) 6684-5142

      D'Crypt Cryptographic Library

      3.8 (Firmware)


      The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

        • Intel x86 64 bit
        • ARM Cortex-A
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4332, DRBG #2094
      1428ClevX, LLC
      9306 NE 125th Street
      Kirkland, WA 98034
      USA

      Lev Bolotin
      Lev.Bolotin@clevx.com
      +1.425.820.9929

      Marc Singer
      Marc.Singer@clevx.com
      425.820.9929

      ClevX Datalock Cryptographic Library

      ClevX-Datalock-v2.0 (Firmware)


      ClevX Datalock Cryptographic Firmware Library

        • STM32L071C
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256
            • Generation Methods: Testing Candidates
          • Prerequisite: DRBG #2077
      1427Nationz Technologies Inc.
      5F, Building A, IER of Huazhong University of Science and Technology
      #9 Yuexing Ave. 3, Nanshan District
      Shenzhen, Guangdong 518057
      P.R.China

      Max Jiang
      jiang.zhaolai@nationz.com.cn
      +86 185 7675 1645

      Nationz Secure IC

      v1.1 (Firmware)


      The Z32HUB II secure chip is based on the 32bit CPU. Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc.

        • Z32HUB II secure IC, V1.0
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4327, DRBG #2090
      1426Nationz Technologies Inc.
      5F, Building A, IER of Huazhong University of Science and Technology
      #9 Yuexing Ave. 3, Nanshan District
      Shenzhen, Guangdong 518057
      P.R.China

      Max Jiang
      jiang.zhaolai@nationz.com.cn
      +86 185 7675 1645

      Nationz Z32H330TC TPM 2.0 Cryptographic Engine TCE01

      v1.1 (Firmware)


      Nationz Z32H330TC TPM 2.0 (Trusted Platform Module), Security processor with embedded firmware compliant with TPM Family 2.0 level 00, revision 1.16 Errata Version 1.5.

        • Z32H330TC secure IC, V1.0
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4326, DRBG #2089
      1425Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

        • N/A
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4325, DRBG #2088
      1424Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen, Certification Program Manager
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos 18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E31xx (Sandy Bridge)
        • Freescale e500 dual core (PB0BJSSE1PNB)
      5/3/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4324, DRBG #2087
      1423Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      4/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Signature Verification:
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4321, DRBG #2085
      1422Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon II (CN6335)
        • Cavium Octeon III (CN7130)
        • Intel Xeon C5518
      4/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4320, DRBG #2084
      1421Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mike Jamison
      (678) 473-2907
      Fax: (678) 473-8470

      Cloudpath Cryptographic Library for Java

      1.0


      Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
      4/27/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4318, DRBG #2083
      1420Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      4/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4314, DRBG #2081
      1419Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1(628)400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4280, DRBG #2073
      1418Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1(628)400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4281, DRBG #2072
      1417Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      4/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4312, DRBG #2079
      1416IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2o [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      4/13/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4311, DRBG #2078
      1415VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
      4/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4307, DRBG #2076
      1414wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      3.14.2


      The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

        • Intel x86 w/ NetBSD v6.0.1
      4/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-512
            • P-384 SHA: SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-512
            • P-384 SHA: SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4306, DRBG #2075
      1413Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd.
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ancrypto.dylib

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • ARMv7 w/ iOS 10.3.3
      4/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4305, DRBG #2074
      1412Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4280, DRBG #2073
      1411Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4281, DRBG #2072
      1410Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4278, DRBG #2056
      1409Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4303, DRBG #2070
      1408Bivio Networks, Inc.
      4457 Willow Road, Suite 240
      Pleasanton, CA 94588
      USA

      Raj Srinivasan
      raj@bivio.net
      (925) 924-8608
      Fax: (925) 924-8650

      OpenSSL

      1.0.2k-8


      OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

        • Intel Xeon Skylake w/ RHEL 7.4
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-384
          • Prerequisite: SHS #4301, DRBG #2069
      1407Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4300, DRBG #2068
      1406SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.1 for TZ, NSA and SuperMassive

      6.5.1 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN68XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon III (CN71XX)
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4297, DRBG #2066
      1405Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      Aruba Common Cryptographic Module (CCM)

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • Intel Core i7 w/ Windows 10 64-bit User Mode
        • Intel Core i5 w/ Windows 10 32-bit User Mode
        • ARMv7 w/ Android 7.1
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4296, DRBG #2065
      1404BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.1


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4294, DRBG #2063
      1403BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.1


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4293, DRBG #2062
      1402Certes Networks, Inc.
      300 Corporate Center Drive
      Suite 140
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point Cryptographic Library

      1.0.2l (Firmware)


      The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

        • Intel Xeon Processor E3 v5 Family
        • Intel Atom Processor C Series
        • Intel Xeon Processor E5 v4 Family
      3/30/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4289, DRBG #2061
      1401Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • Intel Atom
      3/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Prerequisite: SHS #4283, DRBG #2059
      1400Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      3/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4282, DRBG #2058
      1399BeyondTrust
      5090 N. 40th Street
      Suite 400
      Phoenix, AZ 85018
      USA

      David Allen
      dallen@beyondtrust.com
      1-800-234-9072, 9292

      BeyondTrust Cryptographic Library

      2.0.10


      BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

        • Intel Xeon w/ Windows Server 2012 R2 Standard
      3/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4279, DRBG #2057
      1398Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      3/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4278, DRBG #2056
      1397Digi International, Inc.
      11001 Bren Road East
      Minnetonka, MN 55343
      USA

      Donald Schleede
      Donald.Scleede@digi.com
      952-912-3444

      Digi ConnectCore Security Module

      1.0


      The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

        • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
        • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4275, DRBG #2053
      1396Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4270, DRBG #2049
      1395Cisco Systems, Inc
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      7.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

        • ARMv8 w/ Android 7.1
        • Intel Core i5 w/ Windows 10 (with AES-NI)
        • Intel Core i7 w/ macOS 10.12 (with AES-NI)
        • Intel Core i5 w/ Windows 10
        • Intel Pentium w/ Linux 3.4
        • ARMv8 w/ iOS 11.2
        • Intel Core i7 w/ macOS 10.12 (without AES-NI)
        • Cavium Octeon II 68XX w/ Wind River Linux 4
        • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
        • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4267, DRBG #2048
      1394Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4253, DRBG #2037
      1393Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4266, DRBG #2047
      1392Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4265, DRBG #2046
      1391Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #4264, DRBG #2045
      1390Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4263, DRBG #2044
      1389Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4262, DRBG #2043
      1388Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4261, DRBG #2042
      1387Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Patrick Scully
      613-670-3207

      Ciena Waveserver

      1.5.1 (Firmware)


      The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

        • Xilinx XC7Z030
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4254, DRBG #2038
      1386Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4253, DRBG #2037
      1385Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      ProtectServer Internal Express Cryptographic Library

      5.01 (Firmware)


      The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

        • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4252, DRBG #1704
      1384Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

      10.0.14393.1770


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4250, DRBG #2036
      1383Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

      10.0.10240.17643


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4248, DRBG #2035
      1382Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4247, DRBG #2034
      1381Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

      10.0.10586.1176


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4246, DRBG #2033
      1380Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4245, DRBG #2032
      1379Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ CentOS v7.3
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4244, DRBG #2031
      1378DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      +972-39279529
      Fax: +972-39230864

      Moshe Harel
      Moshe.Harel@docusign.com
      +972-39279578
      Fax: +972-39230864

      PrivateServer

      5.0.3 (Firmware)


      PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

        • Intel® E3-1268LV3 Quad-Core
      3/9/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4242, DRBG #2030
      1377Splunk, Inc.
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Michael Arrowsmith
      415-848-8400

      Splunk Cryptographic Module

      2.0.16


      The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ Ubuntu 16.04
        • Intel Xeon E5 with PAA w/ Ubuntu 16.04
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4238, DRBG #2019
      1376Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL with FOM 6.0

      6.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon w/ ADE-OS v3.0
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #4237, DRBG #2018
      1375Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS OpenSSL Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8064
        • Qualcomm IPQ4029
        • NXP QorIQ T1024
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4236, DRBG #2017
      1374Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ4029
        • Qualcomm IPQ8064
        • NXP QorIQ T1024
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4235
      1373IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2n [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4234, DRBG #2016
      1372Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4233, DRBG #2015
      1371Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4232, DRBG #2012
      1370Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • ARMv8
      2/23/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
          • Prerequisite: SHS #4231, DRBG #2011
      1369Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung BoringSSL Cryptographic Module

      v1.2


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Samsung Electronics Exynos7883 w/ Android 8.0
        • Qualcomm MSM8998 w/ Android 8.0
        • Qualcomm MSM8996 w/ Android 8.0
        • Qualcomm SDM845 w/ Android 8.0
        • Samsung Electronics Exynos8890 w/ Android 8.0
        • Samsung Electronics Exynos9810 w/ Android 8.0
        • Samsung Electronics Exynos8895 w/ Android 8.0
        • Samsung Electronics Exynos7570 w/ Android 8.0
        • Samsung Electronics Exynos7884 w/ Android 8.0
      2/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4230, DRBG #2010
      1368Mocana Corporation
      150 Mathilda Place
      Suite 208
      Sunnyvale, CA 94086
      USA

      Srinivas Kumar
      fips@mocana.com
      1-415-617-0055
      Fax: 1-415-617-0056

      Mocana Cryptographic Library

      6.5.1f


      The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

        • Intel Atom E3800 w/ Wind River Linux 6.0
      2/16/2018
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4229, DRBG #2009
      1367
      2/16/2018
        1366Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Marks
        seceval_us@oracle.com
        650-506-0391

        Oracle Acme Packet Cryptographic Library

        ECz8.0.0 (Firmware)


        The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

          • Intel Core i3
          • Intel Core i7
        2/16/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4225, DRBG #2007
        1365Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-224 SHA: SHA-224
              • P-256 SHA: SHA-224, SHA-256
              • P-384 SHA: SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1
              • P-224 SHA: SHA-1, SHA-224
              • P-256 SHA: SHA-1, SHA-224, SHA-256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4221, DRBG #2005
        1364Evertz Microsystems
        5292 John Lucas Dr.
        Burlington, Ontario L7L 5Z9
        Canada

        Naveed Afzal
        nafzal@evertz.com
        905-335-3700

        EXE OpenSSL Cryptographic Module

        2v0_b1 (Firmware)


        Card for 6RU Shelf loaded with Evertz IPX

          • MPC8377E
        2/16/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4220, DRBG #2004
        1363Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Patrick Scully
        pscully@ciena.com
        613-670-3207

        Ciena 6500 Flex3 WaveLogic 3e OCLD Boot Loader

        1.00 (Firmware)


        The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

          • HunQ v3 ASIC
        2/9/2018
        • ECDSA:
          • 186-4:
            • Signature Verification:
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #4219
        1362Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Andrew Pendray
        support@ssni.com
        +1 669 770 4000
        Fax: +1 886 776 0015

        Silver Spring Networks Endpoint Security Module

        130-0117-03 82136; 1.00 (Firmware)


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

          • ESM instruction manager processor
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4148, DRBG #1906
        1361Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0


        The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4216, DRBG #2002
        1360Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0 (Firmware)


        The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon D-1548 (Intel Broadwell-DE)
          • Intel Atom C2358
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4215, DRBG #2001
        1359Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Signature Verification:
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: SHS #4210, DRBG #1996
        1358IBM Corporation
        222 South Riverside Plaza
        Ste 1700
        Chicago, IL 60606
        USA

        Mark Seaborn
        mseaborn@us.ibm.com
        +1 312 423 6640x2354

        IBM Cloud Object Storage System's™ FIPS Cryptographic Module

        1.1


        The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

          • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
          • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4209, DRBG #1995
        1357Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        ancrypto.dylib

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • ARMv7 w/ iOS 10.3.3
        2/9/2018
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-256, P-384
        1356Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        libancrypto.so

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • Intel Core i7 w/ Linux 2.6 64-bit
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4208, DRBG #1994
        1355Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        ancrypto.dll

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • Intel Core i7 w/ Windows 7 64-bit User Mode
          • Intel Core i5 w/ Windows 7 32-bit User Mode
        2/9/2018
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-256, P-384
        1354Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        libancrypto.so

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • ARMv7 w/ Android 6.0.1
          • Intel Core i5 w/ Linux 2.6 32-bit
        2/9/2018
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-256, P-384
        1353Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4207, DRBG #1993
        1352Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4204, DRBG #1988
        1351Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1P w/ watchOS 4
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4203, DRBG #1987
        1350Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4202, DRBG #1984
        1349Gallagher Group
        181 Kahikatea Drive
        Hamilton 3206
        New Zealand

        Andrew Scothern
        andrew.scothern@gallagher.com
        +64-7-838-9800

        Simon Lawrence
        simon.lawrence@gallagher.com
        +64-7-838-9800

        Gallagher OpenSSL Cryptographic Module

        2.0.12


        Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

          • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4196, DRBG #1978
        1348Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4194, DRBG #1976
        1347Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/2/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4193, DRBG #1975
        1346Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4191, DRBG #1972
        1345Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4189, DRBG #1959
        1344Centrify Corporation
        3300 Tannery Way
        Santa Clara, California 95054
        USA

        Kitty Shih
        kitty.shih@centrify.com
        669-444-5238

        Centrify Cryptographic Library

        2.1


        Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

          • Intel Xeon X5650 x86_64 w/ RHEL 7.2
        2/2/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4185, DRBG #1956
        1343Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung SCrypto Library

        v2.2


        Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

          • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
        2/2/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4184, DRBG #1955
        1342Datrium
        385 Moffett Park Dr #205
        Sunnyvale, CA 94089
        USA

        R. Hugo Patterson
        info@datrium.com
        +1 (669) 721-9444

        Datrium FIPS Object Module

        2.0.12


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • Intel Xeon E5-2618L v4 w/ Linux 3.10
          • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
          • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4182, DRBG #1953
        1341Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4180, DRBG #1951
        1340SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Sales
        sales@safelogic.com

        CryptoComply® Server

        2.1


        CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Intel i7 w/ Windows Server 2012 R2
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4177, DRBG #1947
        1339Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.14


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
          • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4175, DRBG #1946
        1338Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.13


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4174, DRBG #1945
        1337Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Java API

        1.0.0


        Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4173, DRBG #1944
        1336Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-1-01 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in sensor and access point.

          • ARMv7
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Testing Candidates
            • Prerequisite: DRBG #1936
        1335Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11 Fusion
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4164, DRBG #1935
        1334Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4163, DRBG #1934
        1333Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/26/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4162, DRBG #1933
        1332Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4161, DRBG #1932
        1331Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4160, DRBG #1931
        1330Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4159, DRBG #1930
        1329Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4158, DRBG #1929
        1328Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4157, DRBG #1928
        1327Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10X w/ tvOS 11 Fusion
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4155, DRBG #1925
        1326Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4152, DRBG #1918
        1325Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/19/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4151, DRBG #1917
        1324Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Timothy McDonough
        timothy.mcdonough@hpe.com

        Hewlett Packard Enterprise SSL Crypto Module

        2.1


        Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

          • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4147, DRBG #1905
        1323Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
          • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4146, DRBG #1904
        1322Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
          • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4145, DRBG #1903
        1321Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Access Point SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

          • Qualcomm IPQ8068
          • Qualcomm IPQ8064
          • Qualcomm IPQ8065
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4144, DRBG #1902
        1320Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (678) 473-2907
        Fax: (678) 473-8470

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4143, DRBG #1901
        1319Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        JUNOS 17.3R2 RE1800 - OpenSSL

        17.3R2 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon LC5518
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4138, DRBG #1895
        1318Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4137, DRBG #1894
        1317Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4136, DRBG #1893
        1316Private Machines, Inc
        164 20th Street
        4A-4B
        Brooklyn, NY 11232
        USA

        Sumeet Bajaj
        sumeet@privatemachines.com

        Radu Sion
        sion@privatemachines.com

        Private Machines Enforcer LIBUCL

        L4-1 2.5.13 (Firmware)


        The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

          • MAX32550 Cortex M3
        1/5/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4131, DRBG #1879
        1315SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sanagala
        usanagala@sonicwall.com
        408-962-6248
        Fax: 408-745-9300

        SonicWall Crypto Library

        SonicOS 6.2.5 (Firmware)


        SonicWall Crypto Library

          • Cavium Octeon
        1/5/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Verification:
              • P-256 SHA: SHA-256
            • Prerequisite: SHS #4130, DRBG #1887
        1314Infineon Technologies AG
        Alter Postweg 101
        Augsburg, BY 86159
        Germany

        Roland Ebrecht
        Roland.Ebrecht@infineon.com
        +49-821-25851-68
        Fax: +49-821-25851-40

        Thomas Hoffmann
        Thomas.Hoffmann@infineon.com
        +49-821-25851-24
        Fax: +49-821-25851-40

        Trusted Platform Module 2.0 SLB 9670

        SLB 9670 7.83 (Firmware)


        Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

          • Infineon SLB 9670 security controller IC
        1/5/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256
            • Signature Generation:
              • P-256 SHA: SHA-256
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256
            • Prerequisite: SHS #4129, DRBG #1886
        1313Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i7 w/ macOS 10.13
        1/5/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4127, DRBG #1885
        1312Huawei Technologies Co., Ltd
        Huawei Industrial Base, Bantian Longgang
        Shenzhen, Guangdong 518129
        China

        SPENCER HE
        heshunbin@huawei.com
        +86-755-28979041

        EulerOS 2.0

        EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

          • Intel Xeon w/ EulerOS 2.0
        1/5/2018
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4126, DRBG #1884
        1311Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4124, DRBG #1880
        1310Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Core M w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4122, DRBG #1874
        1309Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i5 w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4121, DRBG #1873
        1308Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Xeon w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4120, DRBG #1872
        1307Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i7 w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4119, DRBG #1871
        1306Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Core M w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4118, DRBG #1870
        1305Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Xeon w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4117, DRBG #1869
        1304Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i5 w/ macOS 10.13
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4116, DRBG #1868
        1303Qualcomm Technologies, Inc.
        5775 Morehouse Dr
        San Diego, CA 92121
        USA

        Yin Ling Liong
        yliong@qti.qualcomm.com
        858-651-7034
        Fax: 858-845-1523

        Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 64 bit Module

        TZ.XF.5.0.1-00033


        QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 64bit QTEE Trusted Applications.

          • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Prerequisite: SHS #4115, DRBG #885
        1302Qualcomm Technologies, Inc.
        5775 Morehouse Dr
        San Diego, CA 92121
        USA

        Yin Ling Liong
        yliong@qti.qualcomm.com
        858-651-7034
        Fax: 858-845-1523

        Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 32 bit Module

        TZ.XF.5.0.1-00033


        QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 32bit QTEE Trusted Applications.

          • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Prerequisite: SHS #4114, DRBG #885
        1301Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS Version 17.3R2 - OpenSSL

        17.3R2 (Firmware)


        The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

          • Intel Xeon D
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4112, DRBG #1867
        1300Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4110, DRBG #1866
        1299SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.0 for TZ, NSA and SuperMassive

        FW Version 6.5.0 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium OCTEON III (CN7XXX)
          • Cavium OCTEON II (CN6XXX)
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4109, DRBG #1865
        1298Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4106, DRBG #1861
        1297Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 GnuTLS C Implementation

        R7-2.0.0


        GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

          • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        12/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4105, DRBG #1859
        1296Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4102, DRBG #1856
        1295Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4101, DRBG #1855
        1294Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10X Fusion w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4100, DRBG #1854
        1293Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4099, DRBG #1853
        1292Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4098, DRBG #1852
        1291Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4097, DRBG #1851
        1290Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8 w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4096, DRBG #1850
        1289Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        12/15/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4095, DRBG #1849
        1288Samsung Electronics Co., Ltd.
        1-1, Samsungjeonja-ro
        Hwaseong-si, Gyeonggi-do 18448
        KOREA

        Jisoo Kim
        jisoo74.kim@samsung.com
        82-31-8096-2832
        Fax: 823180008000(+62832)

        EPiC2 ECDSA P-224 Library

        EPiC2_ECDSA_P224_V1.0 (Firmware)


        PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

          • Cortex R7 ARM-based CPU
        12/15/2017
        • ECDSA:
          • 186-4:
            • Signature Verification:
              • P-224 SHA: SHA-256
            • Prerequisite: SHS #4072
        1287McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Andy Nissen
        andy.nissen@intel.com
        651-770-6151

        McAfee Advanced Threat Defense

        4.0


        A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

          • Intel Xeon w/ Linux 4.4.27
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4090, DRBG #1843
        1286SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        OpenJDK

        1.8.0-jdk8u152-b01-20170213 (Firmware)


        CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

          • Intel Xeon with AES-NI
          • Intel Core i5 with AES-NI
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #4089, DRBG #1836
        1285SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        libcrypto

        1.0.2k (Firmware)


        OpenSSL v1.0.2k with minor patches.

          • Intel Core i5 with AES-NI
          • Intel Xeon with AES-NI
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #4088, DRBG #1836
        1284Certes Networks, Inc.
        300 Corporate Center Drive
        Suite 140
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        CryptoFlow Net Creator Java Crypto Module

        1.0


        The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

          • Intel Xeon E3-1270v5 w/ CentOS 6.7
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4087, DRBG #1842
        1283RSA Security LLC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        FIPS Program
        fips-program@rsa.com

        RSA BSAFE® Crypto-J JSAFE and JCE Software Module

        6.2.4


        RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

          • Intel Core i5 w/ Windows 10 (64-bit)
          • Intel Xeon w/ CentOS 7.3
          • Qualcomm Snapdragon w/ Android 7.1.2
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: SHS #4085, DRBG #1841
        1282Ruckus Wireless, Inc.
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Suneetha Sarala
        Suneetha.Sarala@arris.com
        650-265-4200

        Julie Lu
        Julie.Lu@arris.com
        650-265-4200

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • ARM Cortex A9
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #4081, DRBG #1837
        1281Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        SafeXcel 1746 Chip

        SF914-17060-100B


        The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

          • N/A
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4080, DRBG #1704
        1280Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna K6 Cryptographic Library

        6.24.6 (Firmware)


        The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

          • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
        12/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4080, DRBG #1704
        1279Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

          • Apple A10X w/ tvOS 11 Fusion
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4076, DRBG #1832
        1278Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna G5 Cryptographic Library

        6.24.6 (Firmware)


        The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

          • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4075, DRBG #1704
        1277Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto Virtual

        F6.2


        The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

          • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4074, DRBG #1828
        1276Cavium, Inc.
        2315 N 1st Street
        San Jose, CA 95131
        USA

        Tejinder Singh
        Tejinder.Singh@caviumnetworks.com
        408-943-7403
        Fax: 408-577-1992

        Phanikumar Kancharla
        Pkkancharla@caviumnetworks.com
        408-943-7496

        ngfips_ecc

        CN52XX 1.0.1 (Firmware)


        The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

          • Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #1165, DRBG #32
        1275Brocade Communications Systems LLC
        120 Holger Way
        San Jose, CA 95110
        USA

        Hamid Sabouti
        hamid.sobouti@broadcom.com
        408-333-4150
        Fax: 408-333-3844

        Brocade Fabric OS FIPS Cryptographic Module

        8.2.0


        Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

          • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
          • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4071, DRBG #1827
        1274SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS on x86 with AES-NI

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4070, DRBG #1826
        1273SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS on x86 without AES-NI

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4069, DRBG #1825
        1272SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS z13

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • z13 w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4068, DRBG #1824
        1271Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        ProtectServer Internal Express Cryptographic Library

        5 (Firmware)


        The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

          • AMCC 440EPx Power PC (PPC440EPx) Embedded
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4067, DRBG #1704
        1270Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        SafeXcel 1746 Chip

        SF914-17060-100B


        The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

          • N/A
        11/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4050, DRBG #1704
        1269Lexmark International, Inc.
        740 West New Circle Road
        Lexington, KY 40550
        USA

        Graydon Dodson
        gdodson@lexmark.com
        +1 859 232-6483

        Crypto Module (user)

        3.2


        Lexmark Crypto Module (user)

          • Marvell MV78460-B0 w/ Lexmark Linux v4
        11/22/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Signature Verification:
              • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4064, DRBG #1821
        1268Lexmark International, Inc.
        740 West New Circle Road
        Lexington, KY 40550
        USA

        Graydon Dodson
        gdodson@lexmark.com
        +1 859 232-6483

        Crypto Module (user)

        3.2


        Lexmark Crypto Module (user)

          • Marvell 88PA6270C0 w/ Lexmark Linux v4
        11/22/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Signature Verification:
              • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4063, DRBG #1820
        1267Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 15.1X49 - SRX345 - HW-Authentec

        CN7130 15.1 X49-D110 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7130)
        11/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4030, DRBG #1769
        1266Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna IS Cryptographic Library

        6.3.2 (Firmware)


        The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

          • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
        11/22/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4050, DRBG #1704
        1265Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6520

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Apple A10 on iOS 10.x
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4046, DRBG #1787
        1264Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

        15.1 X49-D110 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7130)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4033, DRBG #1770
        1263Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations

        6.3.9600


        The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

          • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
          • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #2373, DRBG #489
        1262Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4028, DRBG #1767
        1261Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple 10X Fusion w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4027, DRBG #1766
        1260Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4026, DRBG #1765
        1259Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4025, DRBG #1764
        1258Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4024, DRBG #1762
        1257Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4023, DRBG #1761
        1256Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4022, DRBG #1759
        1255Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A8 w/ iOS 11
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4021, DRBG #1758
        1254Cisco Systems, Inc.
        170 West Tasman Dr.
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto

        F6.2 (Firmware)


        The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

          • Intel Atom C2xxx Family, Intel Xeon 34xx Family
          • Intel Xeon E Family
          • Intel Xeon D Family
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4012, DRBG #1735
        1253Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Surface Hub Virtual TPM Implementations

        10.0.15063.674


        The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Prerequisite: SHS #4011, DRBG #1734
        1252Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

        10.0.16299


        The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Prerequisite: SHS #4009, DRBG #1733
        1251Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Surface Hub MsBignum Cryptographic Implementations

        10.0.15063.674


        The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4011, DRBG #1732
        1250Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Surface Hub SymCrypt Cryptographic Implementations

        10.0.15063.674


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4011, DRBG #1732
        1249Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

        10.0.15254


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4010, DRBG #1731
        1248Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

        10.0.15254


        The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

          • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4010, DRBG #1731
        1247Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

        10.0.16299


        The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
        11/17/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4009, DRBG #1730
        1246Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

        10.0.16299


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
        11/9/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #4009, DRBG #1730
        1245Monkton, Inc
        2236 Central Ave
        Tysons, VA 22182
        USA

        Harold E. Smith III
        harold@monkton.io
        571-527-6680

        OpenSSL

        1.0.2L


        Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton's Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

          • Apple A10 Fusion w/ iOS 10.3.2
          • Apple A10X w/ iOS 10.3.2
        11/9/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4008, DRBG #1632
        1244Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Kevin Meagher
        KMeagher@ciena.com

        Ciena 6500 Packet Optical Family

        12.3


        Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

          • PowerQUICC II w/ VxWorks 6.1
          • PowerQUICC II w/ VxWorks 6.3
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3992, DRBG #1706
        1243Hewlett Packard Enterprise
        8000 Foothills Blvd.
        Roseville, CA 95747
        USA

        Susan Scotten
        susan.scotten@hpe.com
        1-916-540-1109

        Aruba Campus Switch Series Crypto Library

        16.04 (Firmware)


        Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

          • Freescale P2020 Dual Core
          • Dual Core ARM Coretex
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384
            • Prerequisite: DRBG #1705
        1242Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        SafeXcel 3120 Chip

        SF114-011206-001A, v2.9.5


        The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

          • N/A
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-224
              • P-256 SHA: SHA-224, SHA-256
              • P-384 SHA: SHA-224, SHA-256, SHA-384
            • Signature Verification:
              • P-192 SHA: SHA-1
              • P-224 SHA: SHA-1, SHA-224
              • P-256 SHA: SHA-1, SHA-224, SHA-256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Prerequisite: SHS #3988, DRBG #1704
        1241Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel 5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • MIPS64
          • Intel Atom
          • Intel Xeon
          • Intel Xeon on ESXi 5.5
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
            • Prerequisite: SHS #3760, DRBG #1529
        1240Thales e-Security Inc.
        900 South Pine Island Road
        Suite 710
        Plantation, FL 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.con
        954-888-6215

        Vormetric Data Security Manager Virtual Appliance Module

        6.0.2


        The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

          • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3987, DRBG #1703
        1239Thales e-Security Inc.
        900 South Pine Island Road
        Suite 710
        Plantation, FL 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.con
        954-888-6215

        Vormetric Data Security Manager Module

        6.0.2 (Firmware)


        The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

          • Intel Xeon
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3986, DRBG #1702
        1238F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP vCMP on B4450 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3983, DRBG #1700
        1237SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using generic C implementation

        3.0


        This test covers generic C implementation of multiple algorithms.

          • z13 w/ SUSE Linux Enterprise Server 12 SP2
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-256
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
              • P-521 SHA: SHA-256
            • Signature Verification:
              • P-224 SHA: SHA-256
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
              • P-521 SHA: SHA-256
            • Prerequisite: SHS #3982, DRBG #1699
        1236F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP vCMP on B2250 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3981, DRBG #1698
        1235F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP 10350F TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3980, DRBG #1697
        1234F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B4450N TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3979, DRBG #1696
        1233F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038
        Fax: ~

        BigIP B2250 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3978, DRBG #1695
        1232F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP vCMP on B4450 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3977, DRBG #1694
        1231F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B4000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3976, DRBG #1693
        1230F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i5820 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3975, DRBG #1692
        1229F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B7000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E3-1275
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3974, DRBG #1691
        1228F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i7820 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1650
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3976, DRBG #1693
        1227F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i4000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3972, DRBG #1689
        1226F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B4450N OpenSSL Software Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3971, DRBG #1688
        1225F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B2250 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3970, DRBG #1687
        1224F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP 10350F OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3969, DRBG #1686
        1223F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP vCMP on B2250 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3968, DRBG #1685
        1222F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B4000 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3967, DRBG #1684
        1221F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i4000 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3966, DRBG #1683
        1220F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i7820 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1650
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3965, DRBG #1682
        1219F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i5820 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3964, DRBG #1681
        1218F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B7000 OpenSSL Software Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

          • Intel(R) Xeon(R) CPU E3-1275
        10/27/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3963, DRBG #1680
        1217
        10/27/2017
          1216Synopsys, Inc.
          690 East Middlefield Road
          Mountain View, CA 94043
          USA

          Dana Neustadter
          danan@synopsys.com
          +1(613)595-9836

          DWC Cryptography Software Library

          4.2.0


          The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

            • ARC® EM7D Processor with CryptoPack w/ n/a
          10/20/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • Prerequisite: SHS #3958, DRBG #1676
          1215IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00CW683

          Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          10/20/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-521
                • Generation Methods: Testing Candidates
              • Signature Verification:
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3957, DRBG #1675
          1214IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00KP899

          Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          10/20/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-521
                • Generation Methods: Testing Candidates
              • Signature Verification:
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3956, DRBG #1674
          1213Infoblox
          3111 Coronado Drive
          Santa Clara, CA 95054
          USA

          Dave Funk
          dfunk@infoblox.com
          408-986-5591

          NIOS Cryptographic Library

          2.0 (Firmware)


          Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

            • Intel Xeon w/ VMware ESXi 5
            • Intel Xeon
            • Intel Xeon w/ VMware ESXi 6
            • Intel Core i3
          10/13/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3953, DRBG #1671
          1212Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Common Cryptographic Module

          AOS VMC 6.4.2.0-1.3-FIPS (Firmware)


          Linux on Intel

            • Intel x86, i7
          10/13/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1211Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • NXP QorIQ P10XX Series
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1210Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Qualcomm IPQ8068
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1209Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Broadcom BCM53014A
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1208Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • XLP400 Series
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1207Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • XLP300 Series
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1206Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • XLP200 Series
          10/6/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1205Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Bill Shelton
          bshelton@juniper.net
          408-745-2000
          Fax: 408-745-2100

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS Version 17.3R1-OpenSSL

          17.3R1 (Firmware)


          The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

            • Intel Xeon D-1531
          10/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3939, DRBG #1666
          1204SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          SafeLogic Sales
          na

          CryptoComply Server Engine

          2.1


          CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

            • Intel i7 w/ CentOS 7
          9/29/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3929, DRBG #1662
          1203MediaTek Inc.
          No.1, Dusing Rd. 1, Hsinchu Science Park
          Hsinchu, Taiwan 30078
          Taiwan

          William Cheng
          William.cheng@mediatek.com
          +1-858-731-9200
          Fax: +1-858-731-9201

          MingHsien Hsieh
          minghsien.hsieh@mediatek.com
          +886-3-567-0766
          Fax: +886-3-578-7610

          MTK CryptoCore V1.0 Secure Core

          MTK CryptoCoreV1.0 S Core sw-cc710tee-2.0.5.1279 (Firmware)


          The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

            • ARM TrustZone-Enabled Cortex-A Series CPU
          9/29/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3927, DRBG #1661
          1202Sonus Networks, Inc.
          4 Technology Park Drive
          Westford, MAS 01886
          USA

          Keith Conger
          kconger@sonusnet.comkconger@sonusnet.com
          978-614-8115

          Adam Elshama
          aelshama@sonusnet.com
          978-614-8327

          Sonus Cryptographic Library version 3.0

          5.1.2


          Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

            • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
          9/26/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3836, DRBG #1588
          1201Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Hridya Valakkadavil Thilakan
          hridya-valakkadavil.thilakan@hpe.com

          Aprana Shrivastava
          aprana.shrivastava@hpe.com

          HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

          4.71 (Firmware)


          The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

            • PowerPC 440EPx
          9/26/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3920, DRBG #1654
          1200FireEye, Inc.
          1440 McCarthy Boulevard
          Milipitas, CA 90655
          USA

          Steve Lanser
          steve.lanser@fireeye.com
          508-983-2505

          FireEye Cryptographic Implementation

          1.0


          The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

            • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
          9/26/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3919, DRBG #1653
          1199Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux 6 NSS without AES-NI

          R6-1.0.0


          Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

            • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          9/26/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3918, DRBG #1652
          1198IBM Corporation
          1787 Sentry Pkwy West
          Building 18, Suite 200
          Blue Bell, PA 19422
          USA

          Sandeep Singhal
          Sandeep.Singhal1@ibm.com
          215-664-1614

          OpenSSL for the IBM MaaS360 Cloud Extender

          2.91


          The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

            • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
          9/26/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #3914, DRBG #1650
          1197Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto Virtual

          F6.0


          FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

            • Intel Xeon E series w/ ESXi 6.0
            • Intel Xeon E series w/ ESXi 5.5
          9/15/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3913, DRBG #1649
          1196Bomgar Corporation
          578 Highland Colony Parkway
          Paragon Centre, Suite 300
          Ridgeland, MS 39157
          USA

          Faye Santangelo
          FSantangelo@bomgar.com
          6016078322

          Bomgar Cryptographic Engine

          2.0.13 (Firmware)


          The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

            • Intel® Xeon E5-2640 v3
          9/15/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3912, DRBG #1648
          1195SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using generic C implementation

          3.0


          This test covers generic C implementation of multiple algorithms.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/8/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-256
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256
                • P-521 SHA: SHA-256
              • Signature Verification:
                • P-224 SHA: SHA-256
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256
                • P-521 SHA: SHA-256
              • Prerequisite: SHS #3910, DRBG #1644
          1194Lenovo Group Limited
          7001 Development Drive
          Morrisville, NC 27560
          USA

          James Takahashi
          jtakahashi2@lenovo.com
          503-643-8308

          Taylor Greenwood
          tgreenwood@lenovo.com
          515-450-7432

          Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

          1.0


          The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

            • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
          9/8/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3905, SHS #3906, SHS #3907, DRBG #1641
          1193FireEye, Inc.
          1440 McCarthy Boulevard
          Milipitas, CA 90655
          USA

          Steve Lanser
          steve.lanser@fireeye.com
          508-983-2505

          FireEye SSL

          1.0 (Firmware)


          The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

            • Intel Xeon
            • Intel Xeon with ESXi 6.5
            • Intel Atom
            • AMD Opteron
          9/8/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • Prerequisite: SHS #3904, DRBG #1638
          1192VMware, Inc.
          3401 Hillview Ave
          Palo Alto, CA 94303
          USA

          Manoj Maskara
          mmaskara@vmware.com
          650-427-1000
          Fax: 650-475-5001

          Michael McKay
          mmckay@vmware.com
          650-427-3615
          Fax: 650-475-5001

          VMware BC-FJA (Bouncy Castle FIPS Java API)

          1.0.0


          The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

            • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3902, DRBG #1637
          1191Legion of the Bouncy Castle Inc.
          85 The Crescent
          Ascot Vale, Victoria 3032
          Australia

          David Hook
          dgh@bouncycastle.org
          +61438170390

          Jon Eaves
          jon@bouncycastle.org
          +61417502969

          Bouncy Castle FIPS Java API

          1.0.1


          The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

            • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
              • Prerequisite: SHS #3901, DRBG #1636
          1190Software Diversified Services
          1322 81st Ave NE
          Minneapolis, MN 55432
          USA

          Tim Full
          cavp@sdsusa.com

          SDS Cryptographic Module

          1.0


          Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

            • Intel i7 with AES-NI w/ Windows Server 2012 R2
            • Intel i7 with AES-NI w/ Windows Server 2016
            • Intel i7 with AES-NI w/ RedHat 6.9
            • Intel i7 with AES-NI w/ RedHat 7.4
            • POWER8 w/ AIX 6.1
            • POWER8 w/ AIX 7.2
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3898, DRBG #1635
          1189Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Luna K7 Cryptographic Library

          7.0.1 (Firmware)


          The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

            • PowerPC 476
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Prerequisite: DRBG #1634
          1188Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Luna K7 Accelerated Cryptographic Library

          7.0.1 (Firmware)


          The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

            • PowerPC 476
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3896, DRBG #1634
          1187A10 Networks, Inc.
          3 West Plumeria Drive
          San Jose, CA 95134
          USA

          John Chiong
          +1 408 325-8668

          A10 Networks Data Plane FIPS Software Library

          3.0.0 (Firmware)


          The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

            • Intel Xeon E3-1275v2 with AES-NI
            • Intel Xeon E5-1650v3 with AES-NI
            • Intel Xeon E5-2697v2 with AES-NI
            • Intel Xeon E5-2697v4 with AES-NI
          9/1/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #2013, DRBG #1633
          1186Monkton, Inc
          2236 Central Ave
          Tysons, VA 22182
          USA

          Harold E. Smith III
          harold@monkton.io
          571-527-6680

          OpenSSL

          1.0.2L


          Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton's Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

            • Apple A10X w/ iOS 10.3.2
            • Apple A10 Fusion w/ iOS 10.3.2
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-233 SHA: SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3894, DRBG #1632
          1185SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          Ray Potter
          ray@safelogic.com
          650-646-1702

          CryptoComply Server Engine

          2.2


          CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

            • Intel Celeron w/ CentOS 7.3
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3893, DRBG #1631
          1184ARM Ltd
          110 Fulbourn Road
          Cambridge CB1 9NJ
          United Kingdom

          Leo Dorrendorf
          leo.dorrendorf@arm.com
          +972-52-6818594
          Fax: +972-73-2558808

          Udi Maor
          udi.maor@arm.com
          +972-54-4205101
          Fax: +972-73-2558808

          ARM TrustZone Cryptocell 712 TEE

          CC 712 TEE


          ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3892, DRBG #1630
            1183Nuvoton Technology Corporation
            No. 4, Creation Rd. III
            Hsinchu Science Park 300
            Taiwan, R.O.C.

            Yossi Talmi
            yossi.talmi@nuvoton.com
            +972-9-9702364
            Fax: +972-9-9702001

            Oren Tanami
            oren.tanami@nuvoton.com
            +972-9-9702390
            Fax: +972-9-9702001

            Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

            LAG019


            Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

              • N/A
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-1, SHA-256, SHA-384
                  • P-384 SHA: SHA-1, SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-256, SHA-384
                  • P-384 SHA: SHA-1, SHA-256, SHA-384
                • Prerequisite: SHS #3890, DRBG #1628
            1182Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Red Hat NSS Softoken (64 bit)

            5.0


            User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3885, DRBG #1626
            1181Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Red Hat NSS Softoken (32 bit)

            5.0


            User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3884, DRBG #1625
            1180IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • SPARC T4 w/ Solaris(R) 11 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3883, DRBG #1624
            1179IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • SPARC T4 w/ Solaris(R) 11 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3882, DRBG #1623
            1178IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3881, DRBG #1622
            1177IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3879, DRBG #1620
            1176IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3878, DRBG #1619
            1175IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3877, DRBG #1618
            1174IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3876, DRBG #1617
            1173IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
            8/25/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3875, DRBG #1616
            1172IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3874, DRBG #1615
            1171IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3872, DRBG #1613
            1170IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3871, DRBG #1612
            1169IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3870, DRBG #1611
            1168IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3869, DRBG #1610
            1167Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

            15.1X49-D100


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3865, DRBG #1609
            1166Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100- Quicksec

            15.1X49-D100


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
            8/18/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3864, DRBG #1608
            1165Yubico
            420 Florence St, Ste 200
            Palo Alto, CA 94301
            USA

            Jerrod Chong
            jerrod@yubico.com

            Jakob Ehrensvard
            jakob@yubico.com

            Yubico HW/FW ECC

            SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


            This module contains three parts: 1) ECC core hardware/firmware implementation via Infineon CL70 crypto library; 2) High-level firmware implementation for key generation and ECDSA signature generation; 3) ECC curve domain parameters

              • Infineon SLE78V2
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Prerequisite: DRBG #1604
            1164Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-QuickSec

            15.1X49-D100 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3857, DRBG #1603
            1163Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-OpenSSL

            15.1X49-D100 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3856, DRBG #1602
            1162Hewlett Packard Enterprise Storage
            4209 Technology Drive
            Fremont, CA 94538
            USA

            Kurt Heberlein
            kurt.w.heberlein@hpe.com
            +1 512 319 1294

            David Heisser
            david.heisser@hpe.com
            +1 650 209 0937

            HPE-3PAR SSMC 3.2 with Java JCE v1.8

            HPE-3PAR SSMC 3.2


            HPE-3PAR StoreServ Management Console (SSMC) 3.2 running on Windows 2012 R2, Windows 2016, RHEL7.3, or hpelinux (Debian 8) in a Java 1.8 JVM with BouncyCastle JCE provider v156 on any Intel E5 family CPU.

              • Intel Xeon E5 Family w/ Windows 2012
              • Intel Xeon E5 Family w/ Windows 2016
              • Intel Xeon E5 Family w/ hpelinux (Debian 8)
              • Intel Xeon E5 Family w/ RHEL 7.3
            8/11/2017
            • ECDSA:
              • 186-4:
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3852
            1161Trend Micro Inc.
            11305 Alterra Parkway
            Austin, TX 78758
            USA

            Paul Tucker
            paul_tucker@trendmicro.com
            512-633-7945

            TippingPoint Crypto Core OpenSSL

            2.0.13


            The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

              • Intel Core i3 without PAA w/ Linux 4.4
              • Intel Xeon with PAA w/ Linux 4.4
              • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3850, DRBG #1601
            1160SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            SafeLogic Inside Sales
            sales@safelogic.com
            (844) 436-2797

            CryptoComply Java Engine

            3.0.1


            CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

              • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: SHS #3849, DRBG #1600
            1159LG Electronics, Inc.
            20 Yoido-dong
            Youngdungpo-gu
            Seoul 152-721
            Republic of Korea

            Jongseong Kim
            jongseong.kim@lge.com
            82-10-4535-0110
            Fax: 82-2-6950-2080

            LG BoringSSL

            2.0


            General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

              • Snapdragon 835 (MSM8998) w/ Android 7.1.2
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3841, DRBG #1592
            1158NetBrain Technologies, Inc
            15 Network Drive 2nd Floor
            Burlington, Massachusetts 01803
            United States

            Michael Passanisi
            Michael.Passanisi@netbraintech.com
            781-221-7199 (x2055)
            Fax: +1 (781) 998-5800

            Boyang Zhang
            boyang.zhang@netbraintech.com
            781-221-7199 (x2059)

            NetBrain OpenSSL Cryptographic Module

            1.0


            The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

              • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3840, DRBG #1591
            1157Taisys Technologies Co. Ltd.
            7F., No.56, Lane 321
            Yangguang St., Neihu Dist.
            Taipei, Taipei 11491
            Taiwan (R.O.C.)

            Joe Wang
            joe.wang@taisys.com
            +886-2-26270927x6699
            Fax: +886-2-26270619

            Kent Horng
            kent.horng@taisys.com
            +886-2-26562185 #206
            Fax: +886-2-26579657

            TAISYS JUISE-S2

            ST33G1M2


            The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

              • N/A
            8/11/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3838, DRBG #1590
            1156Thales e-security
            900 South Pine Island Road
            Suite 710
            Plantation, Florida 33324
            USA

            Thales Sales
            sales@thalesesec.com
            888-744-4976

            TASP-ECDSA

            V1.0(Hardware) V1.0 (Firmware)


            ECDSA for TASP Bootstrap

              • NXP QorIQ T4081
            8/11/2017
            • ECDSA:
              • 186-4:
                • Signature Generation:
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3829
            1155Cisco Systems, Inc.
            170 W Tasman Dr
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon on VMware ESXi 5.5
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3831, DRBG #1583
            1154Cisco Systems, Inc.
            170 W Tasman Dr
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3830, DRBG #1581
            1153Qualcomm Technologies, Inc.
            5775 Morehouse Dr
            San Diego, CA 92121
            USA

            Yin Ling Liong
            yliong@qti.qualcomm.com
            858-651-7034
            Fax: 858-845-1523

            Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 64bit Module

            TZ.BF.4.0.6-00128


            App Software Crypto Module provides various software cryptographic functionalities to the 64bit QSEE Trusted Applications.

              • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • Prerequisite: SHS #3826, DRBG #1455
            1152Qualcomm Technologies, Inc.
            5775 Morehouse Dr
            San Diego, CA 92121
            USA

            Yin Ling Liong
            yliong@qti.qualcomm.com
            858-651-7034
            Fax: 858-845-1523

            Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 32 bit Module

            TZ.BF.4.0.6-00128


            QSEE Secure App Software Crypto Module provides various software cryptographic

              • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • Prerequisite: SHS #3825, DRBG #1455
            1151Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3824, DRBG #1579
            1150Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3823, DRBG #1578
            1149RSA, The Security Division of EMC
            174 Middlesex Turnpike
            Bedford, MA 01730
            USA

            Rohit Mathur
            rohit.mathur@rsa.com
            +61730325220

            RSA BSAFE Crypto-C Micro Edition

            4.1.3.2


            RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

              • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: SHS #3822, DRBG #1577
            1148Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (Full CPU set, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3821, DRBG #1576
            1147Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            GnuTLS_x86_64_C

            5.0


            GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

              • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3818, DRBG #1575
            1146Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            GnuTLS_x86_C

            5.0


            GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

              • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3817, DRBG #1574
            1145Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 7 NSS without AES-NI

            R7-2.0.0


            Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

              • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3808, DRBG #1568
            1144Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (Full CPU set, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3807, DRBG #1567
            1143DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer Farhi
            ezer@arx.com
            972-39279529
            Fax: 972-39230864

            Moshe Harel
            Moshe.Harel@docusign.com
            972-3-9279578
            Fax: 972-3-9230864

            PrivateServer

            5.0.2 (Firmware)


            PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

              • Intel Xeon Quad-Core
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3804, DRBG #1565
            1142Trusted Concepts
            205 Van Buren St
            Suite 440
            Herndon, VA 20170
            USA

            Chris Greenlee
            chris.greenlee@trustedconcepts.com
            202.680.3718

            TrustedKeep Encryption Module

            1.8.3


            TrustedKeep is a secure object storage and sharing solution.

              • Intel Core i7 w/PAA w/ CentOS 7.3
              • Intel Core i7 w/o PAA w/ CentOS 7.3
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
                • Prerequisite: SHS #3801, DRBG #1563
            1141Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-QuickSec

            15.1X49-D100 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3798, DRBG #1560
            1140Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-OpenSSL

            15.1X49-D100 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            8/4/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                • Prerequisite: SHS #3795, DRBG #1559
            1139Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Titan Key FIPS officer
            titan-key-fips-officer@google.com

            Titan Key

            1.0


            Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

              • N/A
            7/28/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-256
                • Prerequisite: SHS #3794, DRBG #1558
            1138Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Oracle Security Evaluations
            Seceval_us@oracle.com
            +1.800.392.299

            Chris Brych
            +1 613.216.3078

            Oracle ILOM OpenSSL FIPS Object Module

            2.0.10


            Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 140-2 as a software module, multichip standalone module

              • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
              • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
              • Oracle ILOM SP V4 (ARM V5) without PAA w/ Oracle ILOM OS v3.0
            7/28/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3793, DRBG #1557
            1137Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x87416
            Fax: 613-225-9951

            Fortinet FortiOS SSL Cryptographic Library

            5.4 (Firmware)


            This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

              • ARM v5 Compatible (SoC2)
              • ARM v7 Compatible (SoC3)
              • Intel Celeron
              • Intel Xeon E5
              • Intel i3
              • Intel i5
              • Intel i7
            7/28/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3792, DRBG #1543
            1136Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

            10.0.15063


            The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            7/28/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Prerequisite: SHS #3790, DRBG #1556
            1135Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

            10.0.15063


            The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            7/28/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3790, DRBG #1555
            1134Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            Madhu Mathiyalagan
            madhu.mathiyalagan@oracle.com
            (781) 578-7514

            Chris Brych
            chris.brych@oracle.com
            (613) 216-3078

            Oracle Acme Packet OpenSSL Cryptographic Library

            ECz 7.5.0


            The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
            7/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3754, DRBG #1524
            1133Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

            10.0.15063


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            7/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3790, DRBG #1555
            1132Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Timothy McDonough
            timothy.mcdonough@hpe.com

            Hewlett Packard Enterprise SSL Crypto Module Engine

            2.1


            Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

              • ARM i.MX6 w/ Yocto Linux 3.0.35
            7/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3790, DRBG #1554
            1131SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

            3.0


            This test covers assembler implementation of AES, SHA and GHASH.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3788, DRBG #1552
            1130Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x87416
            Fax: 613-225-9951

            Fortinet FortiASIC CP9 Cryptographic Library v5.4

            CP7


            The Fortinet CP9 is a proprietary ASIC providing hardware based cryptographic acceleration for Fortinet products.

              • N/A
            7/14/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3781, DRBG #1543
            1129Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x87416
            Fax: 613-225-9951

            Fortinet FortiOS FIPS Cryptographic Library

            5.4 (Firmware)


            This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

              • ARM v5 Compatible (SoC2)
              • ARM v7 Compatible (SoC3)
              • Intel Celeron
              • Intel Xeon E5
              • Intel i3 Series
              • Intel i5 Series
              • Intel i7 Series
            7/14/2017
            • ECDSA:
              • 186-4:
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3777, DRBG #1543
            1128Hewlett Packard Enterprise
            1160 Enterprise Way
            Sunnyvale, CA 94089
            USA

            Indra Fitzgerald
            indra.fitzgerald@hpe.com
            541-360-6218

            HPE Atalla Cryptographic Subsystem

            1.20 (Firmware)


            The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

              • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
            7/14/2017
            • ECDSA:
              • 186-4:
                • Signature Verification:
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3776, DRBG #1542
            1127SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using SHA assembler

            3.0


            This test covers generic assembler implementation of SHA.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3771, DRBG #1539
            1126Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (3305)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3767, DRBG #1534
            1125Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (2105)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3766, DRBG #1533
            1124Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (325)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3765, DRBG #1532
            1123IBM Corporation
            2455 South Road
            Poughkeepsie, New York 12601-5400
            USA

            John Monti
            jmonti@us.ibm.com
            845-435-4164

            IBM z/OS(R) Cryptographic Services ICSF PKCS #11

            OA52336


            ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

              • IBM z13 w/ IBM z/OS(R) v2.2
            7/8/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3761, DRBG #1530
            1122Cisco Systems, Inc
            170 W Tasman Drive
            San Jose, California 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            IOS Common Cryptographic Module (IC2M)

            Rel5 (Firmware)


            The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

              • MIPS64
              • Intel Atom
              • Intel Xeon on ESXi 5.5
              • PPC405
              • PPCe500
              • PPCe5500
              • Intel Core i3
              • Intel Pentium
              • Intel Xeon
              • PPC465
            7/8/2017
            • ECDSA:
              • 186-4:
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256
                • Prerequisite: SHS #3760, DRBG #1529
            1121L3 Communications Canada / Targa Systems Division
            2081 Merivale Road
            Ottawa, ON K2G1G9
            Canada

            Dave Saunders
            Dave.Saunders@l-3com.com
            613-727-9876
            Fax: 613-727-1705

            Series 4 Gen 3 DTU

            1.0.0-32004093 (Firmware)


            Network Attached Storage device with removable storage.

              • Freescale P1022
            6/30/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3755, DRBG #1525
            1120F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3753, DRBG #1523
            1119F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3750, DRBG #1520
            1118F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3749, DRBG #1519
            1117F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3747, DRBG #1517
            1116F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3745, DRBG #1515
            1115F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3743, DRBG #1513
            1114Futurex
            864 Old Boerne Road
            Bulverde, TX 78163
            USA

            Futurex Security Certifications
            certifications@futurex.com
            830-980-9782

            OpenSSL

            6.2.0.0 (Firmware)


            The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

              • TI AM3352
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3741, DRBG #1511
            1113Cisco Systems, Inc.
            170 West Tasman Drive
            San Jose, CA 95134
            USA

            Kelvin Desplanque
            kdesplan@cisco.com
            6137887216

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon
            6/23/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3739, DRBG #1509
            1112Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Adam Langley
            security@chromium.org

            BoringCrypto

            24e5886c0edfc409c8083d10f9f1120111efd6f5


            A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

              • POWER9 w/ Ubuntu Linux 17.04
              • POWER8 w/ Ubuntu Linux 17.04
              • Intel Xeon E5 w/ Ubuntu Linux 16.04
              • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
              • POWER8 without PAA w/ Ubuntu Linux 15.04
            6/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3736, DRBG #1507
            1111Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN9000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            6/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3734, DRBG #1506
            1110Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN6000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel ATOM
            6/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3733, DRBG #1505
            1109Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
            312 Kings Way
            South Melbourne, Victoria 3205
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN8000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel Xeon
            6/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3732, DRBG #1504
            1108Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            6/21/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3731, DRBG #1503
            1107Bivio Networks, Inc.
            4457 Willow Road, Suite 240
            Pleasanton, CA 94588
            USA

            Raj Srinivasan
            raj@bivio.net
            (925) 924-8608
            Fax: (925) 924-8650

            OpenSSL

            1.0.1e-51


            OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

              • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
            6/16/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-1, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-384
                • Prerequisite: SHS #3727, DRBG #1500
            1106Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            Madhu Mathiyalagan
            madhu.mathiyalagan@oracle.com
            (781) 578-7514

            Chris Brych
            chris.brych@oracle.com
            (613) 216-3078

            Oracle Acme Packet OpenSSL Cryptographic Library

            ECz 7.5.0 (Firmware)


            The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Atom C2358
              • Intel Xeon D-1548 (Intel Broadwell-DE)
            6/16/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3725, DRBG #1499
            1105Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

            R7-2.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            6/16/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3719, DRBG #1495
            1104Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

            R6-1.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            6/16/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3718, DRBG #1494
            1103Palo Alto Networks
            4301 Great America Parkway
            Santa Clara, California 95054
            USA

            Richard Bishop
            rbishop@paloaltonetworks.com
            408-753-4000

            Jake Bajic
            jbajic@paloaltonetworks.com
            408-753-3901

            Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

            8.0 (Firmware)


            The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

              • Cavium Octeon MIPS64
              • Cavium MIPS64
              • Intel Multi Core Xeon
              • Intel Celeron
              • Intel i7
            6/9/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3713, DRBG #1489
            1102Amazon Web Services, Inc.
            410 Terry Ave N
            Ste 1200
            Seattle, WA 98109-5210
            USA

            Kelvin Yiu
            kelvinyi@amazon.com

            Ken Beer
            nbeer@amazon.com

            AWS Key Management Service Cryptographic Algorithm Library

            1.0.0 (Firmware)


            The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

              • Intel Xeon E5-2640v4
            6/9/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            1101Palo Alto Networks
            4301 Great America Parkway
            Santa Clara, California 95054
            USA

            Richard Bishop
            rbishop@paloaltonetworks.com
            408-753-4000

            Jake Bajic
            jbajic@paloaltonetworks.com
            408-753-3901

            Palo Alto Networks Crypto Module (PA VM-series)

            8.0


            The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

              • Intel Multi Core Xeon w/ VMware ESXi 5.5
              • Intel Multi Core Xeon w/ Centos 7.2 - KVM
              • Intel Multi Core Xeon w/ Hyper-V 2012 r2
              • Intel Multi Core Xeon w/ AWS EC2
              • Intel Multi Core Xeon w/ Azure
            6/2/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3707, DRBG #1486
            1100Hewlett Packard Enterprise Company
            3000 Hanover Street
            Palo Alto, CA 94304
            USA

            Luis Luciani
            luis.luciani@hpe.com
            281-518-6762

            Edward Newman
            edward.newman@hpe.com
            281-514-2713

            iLO SSL Firmware Crypto Library

            iLO 5 v1.11 (Firmware)


            HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

              • Cortex A9
            6/2/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3706, DRBG #1485
            1099Symantec Corporation
            350 Ellis Street
            Mountain View, CA 94043
            USA

            Jordan Saxonberg
            jordan_saxonberg@symantec.com
            424-750-7052
            Fax: 424-750-8107

            Symantec SymSSLf Cryptographic Module

            Intel Xeon 1.0.1


            Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

              • Intel Xeon with AES-NI w/ Windows 7 SP1
            5/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3704, DRBG #1477
            1098Symantec Corporation
            350 Ellis Street
            Mountain View, CA 94043
            USA

            Jordan Saxonberg
            jordan_saxonberg@symantec.com
            424-750-7052
            Fax: 424-750-8107

            Symantec SymSSLf Cryptographic Module

            Intel Xeon 1.0.1


            Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

              • Intel Xeon without AES-NI w/ Windows 7 SP1
            5/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3703, DRBG #1476
            1097Intel Corporation
            2200 Mission College Blvd.
            Santa Clara, California 95054
            USA

            Mark Hanson
            mark.hanson@intel.com
            972.963.7326

            McAfee OpenSSL FIPS Object Module

            1.0.0


            The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

              • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
            5/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
                • Prerequisite: SHS #3699, DRBG #1474
            1096VT iDirect
            13681 Sunrise Valley Drive, Suite 300
            Herndon, VA 20171
            USA

            Chris Gormont
            CGormont@idirectgov.com
            703.880.6257

            iDirect Cloak Algorithm Module 1.0

            1.0.2.0 (Firmware)


            VT iDirect, Inc's firmware cryptographic library provides all cryptographic operations for the support of iDirect's Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

              • Altera Cyclone V
            5/12/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-512
                • Prerequisite: SHS #3698, DRBG #1473
            1095Guardtime
            5151 California Ave.
            Suite 210
            Irvine, CA 92617
            USA

            Christian Bravo
            christian.bravo@guardtime.com
            310-227-6558

            Guardtime Cryptographic Support Library (CSL) Direct

            1.0.0 (Firmware)


            Cryptographic library for Guardtime products.

              • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
              • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
            5/12/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3697, DRBG #1472
            1094Flonidan A/S
            Islandsvej 29
            Horsens, Denmark DK-8700
            Denmark

            Tonny Frederiksen
            twf@flonidan.dk
            +45 75 61 88 88

            Kenneth Sørensen
            ks@flonidan.dk
            +45 75 61 88 88

            Flonidan Smart Meter mbedTLS Module

            2.4.0 (Firmware)


            Crypto module used in Flonidan smart meters

              • ARM Cortex
            5/12/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-256
                • Prerequisite: SHS #3696, DRBG #1471
            1093Cog Systems / HTC
            Level 1
            277 King Street
            Newton
            Sydney, NSW 2042
            Australia

            Daniel Potts
            danielp@cog.systems
            +1 855 662 7234

            D4Secure Boring/OpenSSL FIPS Module

            FIPS Module 2.0.14


            The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

              • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
            5/5/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3686, DRBG #1456
            1092Ciena Corporat