Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

SHA-3 Validation List

This list identifies implementations that have been validated as conforming to the SHA-3 family of functions, as specified in Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, using the tests found in the Secure Hash Algorithm-3 Validation Suite (SHA3VS).

No. Vendor Implementation Operational Environments Validated Capabilities
45wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

4.0


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
5/18/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
44D'Crypt Pte Ltd
28 Sin Ming Lane
#06-133 Midview City
Singapore, Singapore 573953
Singapore

Sales & Marketing
marketing@d-crypt.com
(65) 6933-1800
Fax: (65) 6684-5142

Quek Gim Chye
fips@d-crypt.com
(65) 6933-1823
Fax: (65) 6684-5142

D'Crypt Cryptographic Library

3.8 (Firmware)


The D''Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D''Crypt Micro O/S, which is a secure operational environment for running high security applications.

    • Intel x86 64 bit
    • ARM Cortex-A
5/3/2018
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
43Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
4/27/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
42VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
41Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
2/9/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
40Synopsys, Inc.
690 East Middlefield Road
Mountain View, CA 94043
USA

Dana Neustadter
danan@synopsys.com
+1(613)595-9836

DWC Cryptography Software Library

4.2.0


The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

    • ARC® EM7D Processor with CryptoPack w/ n/a
10/27/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
39VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

Michael McKay
mmckay@vmware.com
650-427-3615
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
9/1/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
38Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.1


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
9/1/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 (bits)
    • Output Length Max: 65536 (bits)
37IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
36IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
35IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
34IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
33IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
32IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
31IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
30IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
29IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
28IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
27IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
26IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
25IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
24SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
(844) 436-2797

CryptoComply Java Engine

3.0.1


CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

    • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
8/11/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
23Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D15XX Series

1.0.0 1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor D w/ Red Hat 7.1
8/4/2017
  • SHA3-256:
    • Supports Empty Message
22Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D21XX Series

1.0.0 1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor D w/ Red Hat 7.1
8/4/2017
  • SHA3-256:
    • Supports Empty Message
21Amazon Web Services, Inc.
410 Terry Ave N
Ste 1200
Seattle, WA 98109-5210
USA

Kelvin Yiu
kelvinyi@amazon.com

Ken Beer
nbeer@amazon.com

AWS Key Management Service Cryptographic Algorithm Library

1.0.0 (Firmware)


The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

    • Intel Xeon E5-2640v4
6/9/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
20Xilinx, Inc.
2100 Logic Drive
San Jose, CA 95124
USA

James Wesselkamper
jimwe@xilinx.com
505-798-6863

SHA3/384

Zynq Ultrascale+ MPSoC


SHA3/384 Hard Core

    • VCS
3/31/2017
  • SHA3-384:
    • Supports Empty Message
19Xilinx, Inc.
2100 Logic Drive
San Jose, CA 95124
USA

James Wesselkamper
jimwe@xilinx.com
505-798-6863

SHA3/384

Ultrascale, Ultrascale+


SHA3/384 Hard Core

    • VCS
3/31/2017
  • SHA3-384:
    • Supports Empty Message
18Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0 (Firmware)


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
    • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
3/6/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
17Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Chipset C62X Series

1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor w/ Red Hat 7.1
2/28/2017
  • SHA3-256:
    • Supports Empty Message
16Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Atom™ Processor C3XXX Series

1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Atom™ Processor w/ Fedora 22 (kernel 4.0.4-301)
2/28/2017
  • SHA3-256:
    • Supports Empty Message
15Information Security Corp
1011 Lake St. Suite 425
Oak Park, IL 60118
USA

Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

ISC Cryptographic Development Kit (CDK)

8.0


The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

    • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
2/10/2017
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
14NXP Semiconductors
Stresemannallee 101
Hamburg, Hamburg 22529
Germany

Dr. Almar Kaid
almar.kaid@nxp.com
+ 49 (40) 5613 5123
Fax: + 49 (40) 5613 62773

P73N2M0 Crypto Library

p73n2m0b0.200 1.0.8


The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

    • NXP p73n2m0 w/ n/a
2/10/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
13NXP Semiconductors
Stresemannallee 101
Hamburg, Hamburg 22529
Germany

Dr. Almar Kaid
almar.kaid@nxp.com
+ 49 (40) 5613 5123
Fax: + 49 (40) 5613 62773

P73N2M0 Crypto Library

1.0.8


The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

    • NXP p73n2m0 w/ n/a
2/10/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
12Distech Controls, Inc.
4205 Place de Java
Brossard, QC J4Y 0C4
Canada

Dominic Gagnon
dgagnon@distech-controls.com
450-444-9898 Ext.231
Fax: 450-444-0770

François Gervais
fgervais@distech-controls.com
450-444-9898 Ext.263
Fax: 450-444-0770

Distech Java Cryptographic Library

1.0 (Firmware)


The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

    • AM335x Cortex-A8 (ARMv7) /w NEON
12/23/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
11VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
12/16/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
10VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
12/2/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
9Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel(R) Xeon(R) CPU ES-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
10/28/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
8Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Alan Presser
apresser@allegrosoft.com
(978) 264-6600

Allegro Cryptographic Engine

6.2


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel Core i7 without AES-NI w/ Windows 10 Professional
    • Intel Core i7 with AES-NI w/ Windows 10 Professional
    • Intel Core i7 without AES-NI w/ Linux Mint 18
    • Intel Core i7 with AES-NI w/ Linux Mint 18
10/14/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
7Check Point Software Technologies, Ltd.
9900 Belward Campus Drive
Suite 250
Rockville, MD 20850
USA

Malcom Levy
product_certifications@checkpoint.com
+97237534561

Check Point Crypto Core

4.0


Check Point Crypto Core 4.X is a 140-2 Level 1 cryptographic module for Windows and Mac platforms. The module provides cryptographic services accessible in kernel mode and user mode on the respective platforms through implementation of platform-specific binaries.

    • Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
    • Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
    • Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
    • Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
    • Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
    • Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
    • Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
    • Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
10/6/2016
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
6Oberthur Technologies
402 rue d'Estienne d'Orves
Colombes 92700
France

GOYET Christophe
c.goyet@oberthur.com
+1 703 322 8951

BOUKYOUD Saïd
s.boukyoud@oberthur.com
+33 1 78 14 72 58
Fax: +33 1 78 14 70 20

SHA on Cosmo V8.1

HW = ‘30’ with FW = ‘5F01’ and HW = ‘40’ with FW = ‘6001’ 06939.18 with 08001.3 (Firmware)


ID-One Cosmo V8.1 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.4 and Global Platform 2.2.1 which supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, as well as SHA-3.

    • ID-One PIV on Cosmo V8.1
10/6/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
5Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.1


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
8/4/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
4Information Security Corp
1011 Lake St. Suite 425
Oak Park, IL 60118
USA

Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

ISC Cryptographic Development Kit (CDK)

8.0


The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

    • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
    • Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
    • AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
6/21/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
3Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.0


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6
    • Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6
    • Intel Xeon E5-2697 V3 w/ Ubuntu 14.04 LTS on VMWare ESXi 6.0
4/1/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
2Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.0


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
3/25/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 (bits)
    • Output Length Max: 65536 (bits)
1Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

CRYPEN IPsec

1.0 (Firmware)


CRYPEN IPsec is embedded within proprietary ASICs that are utilized within Cisco hardware platforms.

    • Synopsys VCS v2014.12mx-SP3-2
3/25/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message