Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Component Validation List

This list identifies implementations that have been validated as conforming to individual components of FIPS approved and NIST recommended cryptographic algorithms, as specified in the associated publications, using tests described in the associated validation system (VS) documents.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of modulus and curve sizes providing less than 112 bits of security strength (modulus size 1024 and curve sizes P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation, is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
1845Nuvoton Technology Corporation
No. 4, Creation Rd. III
Hsinchu Science Park 300
Taiwan, R.O.C.

Yossi Talmi
yossi.talmi@nuvoton.com
+972-9-9702364
Fax: +972-9-9702001

Oren Tanami
oren.tanami@nuvoton.com
+972-9-9702390
Fax: +972-9-9702001

Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

LAG019


Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 0, revision 1.38

    • N/A
4/13/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1844Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4314, HMAC #3562
1843Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4314, ECDSA #1420, DRBG #2081
  • KAS FFC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-224
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4314, DSA #1389, DRBG #2081
1842Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd.
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dylib

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ iOS 10.3.3
4/13/2018
  • RSASP1:
    • Modulus Size: 2048 (bits)
    • Padding Algorithms: PKCS 1.5
1841Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1(628)400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service (TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/13/2018
  • ECC CDH:
    • Primitive
    • Curves: P-224, P-256, P-384, P-521
  • KAS ECC:
    • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass DH:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Static Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4280, ECDSA #1419, DRBG #2073
1840Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1(628)400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service (TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/13/2018
  • ECC CDH:
    • Primitive
    • Curves: P-224, P-256, P-384, P-521
  • KAS ECC:
    • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass DH:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Static Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: ECDSA #1418, DRBG #2072
1839BiObex, LLC
11501 Sunset Hills Rd
Suite 200
Reston, VA 22190
USA

Arthur Joyce
ajoyce@biobex.com
571-313-0969

SAFE-Key device

1.2.0.0 (Firmware)


The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

    • STM32F415
4/13/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1838Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4312, HMAC #3558
1837Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • KAS ECC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-224
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4312, ECDSA #1417, DRBG #2079
  • KAS FFC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-224
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4312, DSA #1388, DRBG #2079
1836IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2o [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
4/13/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
    • Prerequisite: SHS #4311, ECDSA #1416, DRBG #2078
  • KAS FFC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4311, DRBG #2078
1835Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 OpenSSH Server & Client

R6-1.0.0


Oracle Linux OpenSSH Cryptographic Module is a software module which supplies cryptographic support for the SSH protocol

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
4/13/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4302, SHS #4303, SHS #4304
1834Allied Telesis
27 Nazareth Ave
Christchurch, Canterbury 8024
New Zealand

Alex Murray
Alex.murray@alliedtelesis.co.nz
+64 3 339 3000
Fax: +64 3 339 3001

Catherine Grulla
securitycertification@alliedtelesis.co.nz
+64 3 339 3000
Fax: +64 3 339 3001

AW+ OpenSSL FIPS Object Module Version 2.0.10

Openssl-fips-2.0.10 (Firmware)


AW+ OpenSSL FIPS Object Module is a software library which provides cryptographic support for secure communication and protection of information. The cryptographic services provided by the library include Symmetric Encryption and Decryption, Digital Signature, Cryptographic Hashing and Keyed-Hash Message Authentication

    • Freescale PowerPC P2040
4/9/2018
  • KAS ECC:
    • Functions: Key Pair Generation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
    • Prerequisite: SHS #3228, ECDSA #858, DRBG #1133
1833VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
4/9/2018
  • RSASP1:
    • Modulus Size: 2048 (bits)
    • Padding Algorithms: PKCS 1.5
1832VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
4/9/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1831VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • ANS 9.63:
    • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307
  • IKEv2:
    • Derived Keying Material length: 160-8192
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 224 (bits)
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 8192 (bits)
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 384 (bits)
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307, HMAC #3553
  • SRTP:
    • AES Key Lengths: 128, 192, 256 (bits)
    • Prerequisite: AES #5365
  • SSH:
    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307, HMAC #3553
1830Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
4/9/2018
  • ECDSA SigGen:
    • P-224 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
    • P-256 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
    • P-384 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
    • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
    • Prerequisite: DRBG #2056
1829Certes Networks, Inc
300 Corporate Center Drive
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point SNMP Library

1.0 (Firmware)


The Certes Enforcement Point SNMP Library provides SNMPv3 support for the Certes CEP appliances.

    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
    • Intel Xeon Processor E3 v5 Family
4/9/2018
  • SNMP:
1828Certes Networks, Inc
300 Corporate Center Drive
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point SSH Library

1.0 (Firmware)


The Certes Enforcement Point SSH Library provides SSH support for the Certes CEP appliances.

    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
    • Intel Xeon Processor E3 v5 Family
4/9/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4289
1827Certes Networks, Inc
300 Corporate Center Drive
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point TLS Library

1.0 (Firmware)


The Certes Enforcement Point TLS Library provides TLSv1.2 support for the Certes CEP appliances.

    • Intel Xeon Processor E5 v4 Family
    • Intel Xeon Processor E3 v5 Family
    • Intel Atom Processor C Series
4/9/2018
  • TLS:
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4289, HMAC #3535
1826wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

3.14.2


The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

    • Intel x86 w/ NetBSD v6.0.1
4/9/2018
  • KAS ECC:
    • Functions: Key Pair Generation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256, SHA-384, SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-384, SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4306, ECDSA #1414, DRBG #2075
  • KAS FFC:
    • Functions: Key Pair Generation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FC:
            • SHA: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4306, DSA #1385, DRBG #2075
1825Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • ECC CDH:
    • Primitive
    • Curves: P-224, P-256, P-384, P-521
  • KAS ECC:
    • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass DH:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Static Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: ECDSA #1412, DRBG #2073
1824Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • ECDSA SigGen:
    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: DRBG #2073
1823Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1822Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4280, HMAC #3526
1821Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • ECC CDH:
    • Primitive
    • Curves: P-224, P-256, P-384, P-521
  • KAS ECC:
    • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass DH:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Static Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
1820Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • ECDSA SigGen:
    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: DRBG #2036
1819Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1818Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4281, HMAC #3527
1817Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4303, HMAC #3549
1816Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • KAS ECC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-224
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4303, ECDSA #1409, DRBG #2070
  • KAS FFC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-224
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4303, DSA #1383, DRBG #2070
1815Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • RSADP:
    • Modulus Size: 2048 (bits)
1814Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • SSH:
    • SHA Functions: SHA-1
    • Prerequisite: SHS #4301
1813Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • ECC CDH:
    • Primitive
    • Curves: P-256
  • KAS ECC:
    • Functions: Domain Parameter Generation, Key Pair Generation, Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-384
    • Prerequisite: SHS #4301, ECDSA #1408, DRBG #2069, HMAC #3547
1812Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4300, ECDSA #1407, DRBG #2068
  • KAS FFC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
    • Prerequisite: SHS #4300, DSA #1382, DRBG #2068
1811Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4300, HMAC #3546
1810SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon III (CN71XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon II (CN66XX)
3/30/2018
  • ECDSA SigGen:
    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: DRBG #2066
1809SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
    • Cavium Octeon II (CN68XX)
3/30/2018
  • IKEv1:
    • Methods: Digital Signature, Pre-shared Key
    • Pre-shared Key Length: 176-1024
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 224 (bits)
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 521 (bits)
        • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4297, HMAC #3543
  • IKEv2:
    • Derived Keying Material length: 160-512
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 224 (bits)
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Diffie-Hellman shared secret:
        • Length: 521 (bits)
        • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4297, HMAC #3543
  • SNMP:
  • SSH:
    • SHA Functions: SHA-1
    • Prerequisite: SHS #4297
  • TLS:
    • Supports TLS 1.0/1.1
    • Prerequisite: SHS #4297, HMAC #3543
1808SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
3/30/2018
  • KAS ECC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • Full Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • One Pass DH:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
      • Static Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-512
          • EC:
            • Curve: P-256
            • SHA: SHA-512
          • ED:
            • Curve: P-384
            • SHA: SHA-512
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4297, ECDSA #1406, DRBG #2066
  • KAS FFC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
    • Schemes:
      • dhHybrid1:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-512
          • FC:
            • SHA: SHA-512
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-512
          • FC:
            • SHA: SHA-512
      • dhHybrid1Flow:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FB:
            • SHA: SHA-512
          • FC:
            • SHA: SHA-512
      • dhOneFlow:
        • Key Agreement Roles: Initiator, Responder
      • dhStatic:
        • Key Agreement Roles: Initiator, Responder
    • Prerequisite: SHS #4297, DSA #1381, DRBG #2066
1807Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

Aruba Common Cryptographic Module (CCM)

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 10 64-bit User Mode
    • Intel Core i5 w/ Windows 10 32-bit User Mode
    • ARMv7 w/ Android 7.1
3/30/2018
  • RSASP1:
    • Modulus Size: 2048 (bits)
    • Padding Algorithms: PKCS 1.5
1806Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/30/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4278
1805ALE (Alcatel Lucent Enterprise)
26801 Agoura Road
Calabasas, CA 91301
USA

Tao Shen
tao.shen@al-enterprise.com
818-878-5038

Vadivel Poonathan
vadivel.poonathan@al-enterprise.com
818-878-4601

Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900(Intel_Atom_C2518)) - ECDH

AOS 8.3.1.R01


This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

    • Intel Atom C2518 w/ AOS 8.3.1.R01
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #3526, ECDSA #1082, DRBG #1348
1804ALE (Alcatel Lucent Enterprise)
26801 Agoura Road
Calabasas, CA 91301
USA

Tao Shen
tao.shen@al-enterprise.com
818-878-5038

Vadivel Poonathan
vadivel.poonathan@al-enterprise.com
818-878-4601

Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(Freescale_PowerPC_MPC8572)) - ECDH

AOS 8.3.1.R01


This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

    • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #3524, ECDSA #1079, DRBG #1346
1803ALE (Alcatel Lucent Enterprise)
26801 Agoura Road
Calabasas, CA 91301
USA

Tao Shen
tao.shen@al-enterprise.com
818-878-5038

Vadivel Poonathan
vadivel.poonathan@al-enterprise.com
818-878-4601

Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(PowerPC_P2040)) - ECDH

AOS 8.3.1.R01


This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

    • PowerPC P2040 w/ AOS 8.3.1.R01
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #3525, ECDSA #1081, DRBG #1347
1802ALE (Alcatel Lucent Enterprise)
26801 Agoura Road
Calabasas, CA 91301
USA

Tao Shen
tao.shen@al-enterprise.com
818-878-5038

Vadivel Poonathan
vadivel.poonathan@al-enterprise.com
818-878-4601

Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860) - ECDH

AOS 8.3.1.R01


This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

    • Cortex ARM 9 w/ AOS 8.3.1.R01
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #3523, ECDSA #1078, DRBG #1345
1801ALE (Alcatel Lucent Enterprise)
26801 Agoura Road
Calabasas, CA 91301
USA

Tao Shen
tao.shen@al-enterprise.com
818-878-5038

Vadivel Poonathan
vadivel.poonathan@al-enterprise.com
818-878-4601

Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K) - ECDH

AOS 8.3.1.R01


This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

    • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
3/30/2018
  • KAS ECC:
    • Functions: Partial Public Key Validation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #3520, ECDSA #1077, DRBG #1342
1800Certes Networks, Inc.
300 Corporate Center Drive
Suite 140
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point Cryptographic Library

1.0.2l (Firmware)


The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

    • Intel Xeon Processor E3 v5 Family
    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
3/30/2018
  • ECC CDH:
    • Primitive
    • Curves: P-224, P-256, P-384, P-521
1799Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - Authentec

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
    • Broadcom XLP832
    • Cavium Octeon III (CN7130)
    • Cavium Octeon II (CN6335)
3/30/2018
  • IKEv1:
    • Methods: Digital Signature, Pre-shared Key
    • Pre-shared Key Length: 8-256
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 256 (bits)
        • SHA Functions: SHA-256, SHA-384
      • Diffie-Hellman shared secret:
        • Length: 384 (bits)
        • SHA Functions: SHA-256, SHA-384
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4288, HMAC #3534
  • IKEv2:
    • Derived Keying Material length: 1136-2432
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 256 (bits)
        • SHA Functions: SHA-256, SHA-384
      • Diffie-Hellman shared secret:
        • Length: 384 (bits)
        • SHA Functions: SHA-256, SHA-384
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4288, HMAC #3534
1798Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • Intel Atom
3/23/2018
  • IKEv1:
    • Methods: Digital Signature, Pre-shared Key
    • Pre-shared Key Length: 8-224
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-1, SHA-256
    • Prerequisite: SHS #4283, HMAC #3529
  • IKEv2:
    • Derived Keying Material length: 1056-3072
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-1, SHA-256
    • Prerequisite: SHS #4283, HMAC #3529
  • SNMP:
  • SRTP:
    • AES Key Lengths: 128, 192, 256 (bits)
    • Prerequisite: AES #5333
  • SSH:
    • SHA Functions: SHA-1
    • Prerequisite: SHS #4283
  • TLS:
    • Supports TLS 1.0/1.1
    • Prerequisite: SHS #4283, HMAC #3529
1797Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • Intel Atom
3/23/2018
  • KAS ECC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
    • Prerequisite: SHS #4283, ECDSA #1401, DRBG #2059
  • KAS FFC:
    • Functions: Full Public Key Validation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4283, DRBG #2059
1796Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/23/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4282
1795BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4279
  • TLS:
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4279, HMAC #3525
1794BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • ECC CDH:
    • Primitive
    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • KAS ECC:
    • Functions: Key Pair Generation
    • Schemes:
      • Ephemeral Unified:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • EB:
            • Curve: P-224
            • SHA: SHA-224
          • EC:
            • Curve: P-256
            • SHA: SHA-256
          • ED:
            • Curve: P-384
            • SHA: SHA-384
          • EE:
            • Curve: P-521
            • SHA: SHA-512
    • Prerequisite: SHS #4279, ECDSA #1399, DRBG #2057
  • KAS FFC:
    • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
    • Prerequisite: SHS #4279, DSA #1377, DRBG #2057
1793Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/23/2018
  • ECDSA SigGen:
    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: DRBG #2056
1792
3/23/2018
    1791
    3/23/2018
      1790Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone SNMP Crypto Library

      1.0


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
      3/16/2018
      • SNMP:
      1789Digital Guardian, Inc.
      860 Winter Street
      Suite 3
      Waltham, MA 02541
      USA

      Craig Hansen
      201-572-3784

      FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

      1.1


      Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

        • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
      3/16/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1788Digi International, Inc.
      11001 Bren Road East
      Minnetonka, MN 55343
      USA

      Donald Schleede
      Donald.Scleede@digi.com
      952-912-3444

      Digi ConnectCore Security Module

      1.0


      The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

        • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
        • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
      3/16/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1787Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x7416
      Fax: 613-225-9951

      Fortinet FortiMail SSL Cryptographic Library 6.0

      6.0 (Firmware)


      This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

        • Intel Xeon
      3/16/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4271
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4271, HMAC #3517
      1786Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x7416
      Fax: 613-225-9951

      Fortinet FortiMail SSL Cryptographic Library 6.0

      6.0 (Firmware)


      This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

        • Intel Xeon
      3/16/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4271, DRBG #2050
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4271, DRBG #2050
      1785Evertz Microsystems
      5292 John Lucas Dr.
      Burlington, Ontario L7L 5Z9
      Canada

      Naveed Afzal
      nafzal@evertz.com
      905-335-3700

      EXE OpenSSL Cryptographic Module

      2v0_b1 (Firmware)


      Card for 6RU Shelf loaded with Evertz IPX

        • MPC8377E
      3/16/2018
      • KAS ECC:
        • Functions: Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4220, ECDSA #1364, DRBG #2004
      1784Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      3/16/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1783Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      3/16/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384
      1782Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      3/16/2018
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4270
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4270, HMAC #3516
      1781Microchip Technology
      1150 E. Cheyenne Mountain Blvd
      Colorado Springs, CO USA
      80906

      Jim Hallman
      jim.hallman@microchip.com
      (919) 846-3391

      ATECC608A

      ATECC608A rev 6001 (Firmware)


      The device is a member of the Microchip CryptoAuthentication family. It is a cryptographic Co-processor with secure hardware-based key storage used for secure authentication and product validation.

        • n/a
      3/16/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256
        • Prerequisite: SHS #4268, HMAC #3514
      1780Cisco Systems, Inc
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      7.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

        • Intel Pentium w/ Linux 3.4
        • Cavium Octeon II 68XX w/ Linux 2.6
        • Intel Core i5 w/ Windows 10
        • Intel Xeon w/ Linux 3.10 on VMware ESXI 6.0
        • ARMv8 w/ iOS 11.2
        • ARMv8 w/ Android 7.1
        • Intel Core i5 w/ Windows 10 (with AES-NI)
        • Intel Core i7 w/ macOS 10.12 (with AES-NI)
        • Intel Xeon w/ Linux 3.10 (with AES-NI)
      3/16/2018
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1
        • Prerequisite: SHS #4267, HMAC #3513
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5310
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4267
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4267, HMAC #3513
      1779Cisco Systems, Inc
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      7.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

        • ARMv8 w/ Android 7.1
        • Intel Core i5 w/ Windows 10 (with AES-NI)
        • Intel Core i7 w/ macOS 10.12 (with AES-NI)
        • Intel Core i5 w/ Windows 10
        • Cavium Octeon II 68XX w/ Linux 2.6
        • Intel Xeon w/ Linux 3.10 (with AES-NI)
        • Intel Pentium w/ Linux 3.4
        • ARMv8 w/ iOS 11.2
        • Intel Xeon w/ Linux 3.10 on VMware ESXI 6.0
      3/16/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: AES #5310, AES #5310, SHS #4267, ECDSA #1395, DRBG #2048, HMAC #3513
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4267, DSA #1374, DRBG #2048
      1778Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone SNMP Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
        • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
      3/16/2018
      • SNMP:
      1777Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Access Point SNMP Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

        • Qualcomm IPQ8064
        • Qualcomm IPQ8068
        • Qualcomm IPQ8065
      3/16/2018
      • SNMP:
      1776Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
      3/16/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1775Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
      3/16/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1774Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-256
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4266, HMAC #3512
      • IKEv2:
        • Derived Keying Material length: 1136-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4266, HMAC #3512
      1773Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-256
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4265, HMAC #3511
      • IKEv2:
        • Derived Keying Material length: 1136-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4265, HMAC #3511
      1772Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-256
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4264, HMAC #3510
      • IKEv2:
        • Derived Keying Material length: 1136-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4264, HMAC #3510
      1771Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSH

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4263
      1770Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSH

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4262
      1769Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSH

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4261
      1768Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Patrick Scully
      613-670-3207

      Ciena Waveserver

      1.5.1 (Firmware)


      The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

        • Xilinx XC7Z030
      3/9/2018
      • IKEv2:
        • Derived Keying Material length: 1056-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4254, HMAC #3500
      1767Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
      3/9/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1766Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
      3/9/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
        • Prerequisite: DRBG #2037
      1765Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
      3/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1764Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
      3/9/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 64-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4253, HMAC #3499
      • IKEv2:
        • Derived Keying Material length: 192-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4253, HMAC #3499
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4253, HMAC #3499
      1763Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); BcryptPrimitives and NCryptSSLp

      10.0.14393.1770


      The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
      3/9/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 64-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4250, HMAC #3497
      • IKEv2:
        • Derived Keying Material length: 192-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4250, HMAC #3497
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4250, HMAC #3497
      1762Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); Cryptography Next Generation (CNG) Implementations

      10.0.14393.1770


      The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
      3/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1761Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

      10.0.14393.1770


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
      3/9/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1760Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

      10.0.14393.1770


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
      3/9/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
        • Prerequisite: DRBG #2036
      1759Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

      10.0.10240.17643


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
      3/9/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
        • Prerequisite: DRBG #2035
      1758Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); Cryptography Next Generation (CNG) Implementations

      10.0.10240.17643


      The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
      3/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1757Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); BcryptPrimitives and NCryptSSLp

      10.0.10240.17643


      The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
      3/9/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 64-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4248, HMAC #3496
      • IKEv2:
        • Derived Keying Material length: 192-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4248, HMAC #3496
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4248, HMAC #3496
      1756Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

      10.0.10240.17643


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
      3/9/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1755Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); Cryptography Next Generation (CNG) Implementations

      10.0.10586.1176


      The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
      3/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1754Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); BcryptPrimitives and NCryptSSLp

      10.0.10586.1176


      The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
      3/9/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 64-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4246, HMAC #3494
      • IKEv2:
        • Derived Keying Material length: 192-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4246, HMAC #3494
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4246, HMAC #3494
      1753Google LLC
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
      3/9/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4247, HMAC #3495
      1752Google LLC
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
      3/9/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2034
      1751Google LLC
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
      3/9/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4247, ECDSA #1382, DRBG #2034
      1750Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

      10.0.10586.1176


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
      3/9/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1749Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

      10.0.10586.1176


      The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
      3/9/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
        • Prerequisite: DRBG #2033
      1748Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
      3/9/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1747Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ CentOS v7.3
      3/9/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1746DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      +972-39279529
      Fax: +972-39230864

      Moshe Harel
      Moshe.Harel@docusign.com
      +972-39279578
      Fax: +972-39230864

      PrivateServer-OpenSSL

      5.0.3 (Firmware)


      PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

        • Intel® E3-1268LV3 Quad-Core
      3/9/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256
        • Prerequisite: SHS #4243, HMAC #3491
      1745DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      +972-39279529
      Fax: +972-39230864

      Moshe Harel
      Moshe.Harel@docusign.com
      +972-39279578
      Fax: +972-39230864

      PrivateServer

      5.0.3 (Firmware)


      PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

        • Intel® E3-1268LV3 Quad-Core
      3/9/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: RNG #2030
      1744Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel i7 w/ macOS 10.13
      3/2/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #1885
      1743Oracle Communications
      100 Crosby Drive
      Bedford, MA 01730
      USA

      George Guo
      george.guo@oracle.com
      (781) 538-7399

      Chris Marks
      chris.marks@oracle.com
      (650) 506-0391

      Oracle Acme Packet Mocana Cryptographic Library

      ECz 8.0.0 (Firmware)


      The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

        • Intel Atom C2358
        • Intel Xeon D-1548 (Intel Broadwell-DE)
      3/2/2018
      • IKEv1:
        • Methods: Pre-shared Key
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4239, HMAC #3844
      • SSH:
        • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4239
      1742Splunk
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Michael Arrowsmith
      415-848-8400

      Splunk Cryptographic Module

      2.0.16


      The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ Ubuntu 16.04
        • Intel Xeon E5 with PAA w/ Ubuntu 16.04
      2/23/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1741Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL with FOM 6.0

      6.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon w/ ADE-OS v3.0
      2/23/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
      1740Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL with FOM 6.0

      6.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon w/ ADE-OS v3.0
      2/23/2018
      • IKEv2:
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1
        • Prerequisite: SHS #4237, HMAC #3486
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5267
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4237
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4237, HMAC #3486
      1739Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS OpenSSL Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • NXP QorIQ T1024
        • Qualcomm IPQ8064
        • Qualcomm IPQ4029
      2/23/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1738Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS OpenSSL Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8064
        • Qualcomm IPQ4029
        • NXP QorIQ T1024
      2/23/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 48-384
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4236, HMAC #3485
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4236
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4236, HMAC #3485
      1737Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • NXP QorIQ T1024
        • Qualcomm IPQ8064
        • Qualcomm IPQ4029
      2/23/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1736Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ4029
        • Qualcomm IPQ8064
        • NXP QorIQ T1024
      2/23/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 48-384
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4235, HMAC #3484
      • IKEv2:
        • Derived Keying Material length: 1120-2688
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #4235, HMAC #3484
      1735IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2n [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      2/23/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4234, ECDSA #1373, DRBG #2016
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: DSA #1364, DRBG #2016
      1734Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
      2/23/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4233, HMAC #3482
      1733Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
      2/23/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4233, ECDSA #1372, DRBG #2015
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4233, DSA #1363, DRBG #2015
      1732Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
      2/23/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4232, HMAC #3481
      1731Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
      2/23/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4232, ECDSA #1371, DRBG #2012
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4232, DSA #1362, DRBG #2012
      1730Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • ARMv8
      2/23/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-224
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4231, HMAC #3480
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4231, HMAC #3480
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5258
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4231
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4231, HMAC #3480
      1729Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • ARMv8
      2/23/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4231, ECDSA #1370, DRBG #2011
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4231, DRBG #2011
      1728Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Marks
      seceval_us@oracle.com
      650-506-0391

      Cavium Nitrox PX1620

      PX1620


      The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

        • N/A
      2/23/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1727Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Marks
      seceval_us@oracle.com
      650-506-0391

      Cavium Octeon CN 6880

      CN 6880


      The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

        • N/A
      2/23/2018
      • SRTP:
        • AES Key Lengths: 128 (bits)
        • Prerequisite: AES #5256
      1726Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung BoringSSL Cryptographic Module

      v1.2


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Samsung Electronics Exynos7570 w/ Android 8.0
        • Qualcomm MSM8996 w/ Android 8.0
        • Qualcomm SDM845 w/ Android 8.0
        • Samsung Electronics Exynos9810 w/ Android 8.0
        • Samsung Electronics Exynos8895 w/ Android 8.0
        • Samsung Electronics Exynos8890 w/ Android 8.0
        • Qualcomm MSM8998 w/ Android 8.0
        • Samsung Electronics Exynos7883 w/ Android 8.0
        • Samsung Electronics Exynos7884 w/ Android 8.0
      2/16/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1725Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung BoringSSL Cryptographic Module

      v1.2


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Samsung Electronics Exynos7883 w/ Android 8.0
        • Qualcomm MSM8998 w/ Android 8.0
        • Qualcomm MSM8996 w/ Android 8.0
        • Qualcomm SDM845 w/ Android 8.0
        • Samsung Electronics Exynos8890 w/ Android 8.0
        • Samsung Electronics Exynos9810 w/ Android 8.0
        • Samsung Electronics Exynos8895 w/ Android 8.0
        • Samsung Electronics Exynos7570 w/ Android 8.0
        • Samsung Electronics Exynos7884 w/ Android 8.0
      2/16/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4229, ECDSA #1369, DRBG #2009
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4230, DSA #1361, DRBG #2010
      1724Mocana Corporation
      150 Mathilda Place
      Suite 208
      Sunnyvale, CA 94086
      USA

      Srinivas Kumar
      fips@mocana.com
      1-415-617-0055
      Fax: 1-415-617-0056

      Mocana Cryptographic Library

      6.5.1f


      The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

        • Intel Atom E3800 w/ Wind River Linux 6.0
      2/16/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2009
      1723Mocana Corporation
      150 Mathilda Place
      Suite 208
      Sunnyvale, CA 94086
      USA

      Srinivas Kumar
      fips@mocana.com
      1-415-617-0055
      Fax: 1-415-617-0056

      Mocana Cryptographic Library

      6.5.1f


      The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

        • Intel Atom E3800 w/ Wind River Linux 6.0
      2/16/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-256
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4229, ECDSA #1368, DRBG #2009
      • KAS FFC:
        • Functions: Domain Parameter Generation, Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4229, DSA #1360, DRBG #2009
      1722
      2/16/2018
        1721Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Marks
        seceval_us@oracle.com
        650-506-0391

        Oracle Acme Packet Mocana Cryptographic Library

        ECz8.0.0 (Firmware)


        The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

          • Intel Core i7
          • Intel Core i3
        2/16/2018
        • IKEv1:
          • Methods: Pre-shared Key
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4226, HMAC #3475
        • SSH:
          • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4226
        1720Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Marks
        seceval_us@oracle.com
        650-506-0391

        Oracle Acme Packet Cryptographic Library

        ECz8.0.0 (Firmware)


        The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

          • Intel Core i3
          • Intel Core i7
        2/16/2018
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128 (bits)
          • Prerequisite: AES #5247
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4225, HMAC #3474
        1719Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Mocana Cryptographic Library

        ECz 8.0.0


        The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
        2/16/2018
        • IKEv1:
          • Methods: Pre-shared Key
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4224, HMAC #3473
        • SSH:
          • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4224
        1718Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSH Server/Client

        6.0


        SP 800-135 KDF for Intel x86 64-bit

          • Intel(R) Xeon(R) CPU E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
        2/16/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4193
        1717Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • RSASP1:
          • Modulus Size: 2048 (bits)
          • Padding Algorithms: PKCS 1.5
        1716Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1715Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1714Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • RSASP1:
          • Modulus Size: 2048 (bits)
          • Padding Algorithms: PKCS 1.5
        1713Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1712Gallagher Group
        181 Kahikatea Drive
        Hamilton 3206
        New Zealand

        Andrew Scothern
        andrew.scothern@gallagher.com
        +64-7-838-9800

        Simon Lawrence
        simon.lawrence@gallagher.com
        +64-7-838-9800

        Gallagher OpenSSL Cryptographic Module

        2.0.12


        Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

          • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
        2/9/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1711Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Andrew Pendray
        support@ssni.com
        +1 669 770 4000
        Fax: +1 886 776 0015

        Silver Spring Networks Endpoint Security Module

        130-0117-03 82136; 1.00 (Firmware)


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

          • ESM instruction manager processor
        2/9/2018
        • RSASP1:
          • Modulus Size: 2048 (bits)
          • Padding Algorithms: PKCS 1.5
        1710Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Andrew Pendray
        support@ssni.com
        +1 669 770 4000
        Fax: +1 886 776 0015

        Silver Spring Networks Endpoint Security Module

        130-0117-03 82136; 1.00 (Firmware)


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

          • ESM instruction manager processor
        2/9/2018
        • ANS 9.63:
          • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4148
        • IKEv1:
          • Methods: Digital Signature
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 (bits)
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 384 (bits)
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-256
          • Prerequisite: SHS #4148, HMAC #3402
        • IKEv2:
          • Derived Keying Material length: 160-512
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 (bits)
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 384 (bits)
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-256
          • Prerequisite: SHS #4148, HMAC #3402
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4148, HMAC #3402
        1709Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Andrew Pendray
        support@ssni.com
        +1 669 770 4000
        Fax: +1 886 776 0015

        Silver Spring Networks Endpoint Security Module

        130-0117-03 82136; 1.00 (Firmware)


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

          • ESM instruction manager processor
        2/9/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384
        • KAS FFC:
          • Functions: Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhHybrid1:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
            • dhHybrid1Flow:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
            • dhOneFlow:
              • Key Agreement Roles: Initiator, Responder
            • dhStatic:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4148, DSA #1359, DRBG #1906
        1708Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0


        The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
        2/9/2018
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128 (bits)
          • Prerequisite: AES #5236
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4216, HMAC #3468
        1707Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0 (Firmware)


        The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon D-1548 (Intel Broadwell-DE)
          • Intel Atom C2358
        2/9/2018
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128 (bits)
          • Prerequisite: AES #5235
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4215, HMAC #3467
        1706Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        2/9/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1705Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
        2/9/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4210
        1704Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        2/9/2018
        • ECC CDH:
          • Primitive
          • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1703IBM Corporation
        222 South Riverside Plaza
        Ste 1700
        Chicago, IL 60606
        USA

        Mark Seaborn
        mseaborn@us.ibm.com
        +1 312 423 6640x2354

        IBM Cloud Object Storage System's™ FIPS Cryptographic Module

        1.1


        The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

          • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
          • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
        2/9/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1702Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        libancrypto.so

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • Intel Core i7 w/ Linux 2.6 64-bit
        2/9/2018
        • RSASP1:
          • Modulus Size: 2048 (bits)
          • Padding Algorithms: PKCS 1.5
        1701Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4207, HMAC #3459
        1700Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4207, ECDSA #1353, DRBG #1993
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4207, DSA #1350, DRBG #1993
        1699Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1988
        1698Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4204, ECDSA #1352, DRBG #1988, HMAC #3456
        1697Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1 w/ watchOS 4
        2/9/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1987
        1696Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1 w/ watchOS 4
        2/9/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4703, ECDSA #1351, DRBG #1987, HMAC #3455
        1695Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel 5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • Intel Atom
          • Intel Xeon
          • MIPS64
          • Intel Xeon on ESXi 5.5
        2/9/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #3760, ECDSA #1241, DRBG #1529
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3760, DRBG #1529
        1694Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4202, HMAC #3454
        1693Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4202, ECDSA #1350, DRBG #1984
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4202, DSA #1349, DRBG #1984
        1692Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4199, HMAC #3451
        1691Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4198, HMAC #3450
        1690Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4194, HMAC #3446
        1689Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • KAS ECC:
          • Functions: Full Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4194, ECDSA #1348, DRBG #1976
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4194, DSA #1347, DRBG #1976
        1688Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/2/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4193, HMAC #3445
        1687Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
        2/2/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4193, ECDSA #1347, DRBG #1975
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4193, DSA #1346, DRBG #1975
        1686Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1972
        1685Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4191, ECDSA #1346, DRBG #1972, HMAC #3443
        1684Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1959
        1683Centrify Corporation
        3300 Tannery Way
        Santa Clara, California 95054
        USA

        Kitty Shih
        kitty.shih@centrify.com
        669-444-5238

        Centrify Cryptographic Library

        2.1


        Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

          • Intel Xeon X5650 x86_64 w/ RHEL 7.2
        2/2/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1682Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung SCrypto Library

        v2.2


        Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

          • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
        2/2/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1681Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung SCrypto Library

        v2.2


        Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

          • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
        2/2/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4184, ECDSA #1343, DRBG #1955
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4184, DSA #1344, DRBG #1955
        1680Datrium
        385 Moffett Park Dr #205
        Sunnyvale, CA 94089
        USA

        R. Hugo Patterson
        info@datrium.com
        +1 (669) 721-9444

        Datrium FIPS Object Module

        2.0.12


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • Intel Xeon E5-2618L v4 w/ Linux 3.10
          • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
          • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
        1/26/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1679Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1951
        1678Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4180, ECDSA #1341, DRBG #1951, HMAC #3432
        1677SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Sales
        sales@safelogic.com

        CryptoComply® Server

        2.1


        CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Intel i7 w/ Windows Server 2012 R2
        1/26/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1676Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.14


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
          • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4175, ECDSA #1339, DRBG #1946
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4175, DSA #1340, DRBG #1946
        1675Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.13


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4174, ECDSA #1338, DRBG #1945
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4174, DSA #1339, DRBG #1945
        1674Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Java API

        1.0.0


        Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
        1/26/2018
        • IKEv2:
          • Derived Keying Material length: 1056-3072
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4173, HMAC #3427
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4173
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4173, HMAC #3427
        1673Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-1-01 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in sensor and access point.

          • ARMv7
        1/26/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256
        1672Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-1-01 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in sensor and access point.

          • ARMv7
        1/26/2018
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4165
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-384
          • Prerequisite: SHS #4165, HMAC #3419
        1671Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11 Fusion
        1/26/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1935
        1670Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11 Fusion
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4164, ECDSA #1335, DRBG #1935, HMAC #3418
        1669Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        1/26/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1934
        1668Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4163, ECDSA #1334, DRBG #1934, HMAC #3417
        1667Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/26/2018
        • ECDSA SigGen:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1933
        1666Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/26/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4162, ECDSA #1333, DRBG #1933, HMAC #3416
        1665Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1932
        1664Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4161, ECDSA #1332, DRBG #1932
        1663Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1931
        1662Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4160, ECDSA #1331, DRBG #1931, HMAC #3414
        1661Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1930
        1660Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4159, ECDSA #1330, DRBG #1930, HMAC #3413
        1659Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1929
        1658Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4158, ECDSA #1329, DRBG #1929, HMAC #3412
        1657Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1928
        1656Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4157, ECDSA #1328, DRBG #1928, HMAC #3411
        1655Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10X w/ tvOS 11 Fusion
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1925
        1654Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10X w/ tvOS 11 Fusion
        1/19/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4155, ECDSA #1327, DRBG #1925, HMAC #3409
        1653Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1918
        1652Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S1 w/ watchOS 4
        1/19/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1917
        1651GDC Technology (USA) LLC
        1016 West Magnolia Boulevard
        Burbank, California 91506
        USA

        Pranay Kumar
        pranay@gdc-tech.com
        (852) 2507 9565
        Fax: (852) 2579 1131

        ChernYue Kwok
        Chernyue.kwok@gdc-tech.com
        (852) 2507 9552
        Fax: (852) 2579 1131

        Standalone IMB Cryptographic Module

        2.0.11 (Firmware)


        A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

          • Xilinx Zynq Ultrascale+
        1/19/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1650GDC Technology (USA) LLC
        1016 West Magnolia Boulevard
        Burbank, California 91506
        USA

        Pranay Kumar
        pranay@gdc-tech.com
        (852) 2507 9565
        Fax: (852) 2579 1131

        ChernYue Kwok
        Chernyue.kwok@gdc-tech.com
        (852) 2507 9552
        Fax: (852) 2579 1131

        Standalone IMB Cryptographic Module

        2.0.11 (Firmware)


        A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

          • Xilinx Zynq Ultrascale+
        1/19/2018
        • TLS:
          • Supports TLS 1.0/1.1
        1649Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Timothy McDonough
        timothy.mcdonough@hpe.com

        Hewlett Packard Enterpprise SSL Crypto Module

        2.1


        Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

          • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
        1/12/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1648Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
          • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        1/12/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4146
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4146, HMAC #3400
        1647Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
          • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
        1/12/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4145
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4145, HMAC #3399
        1646Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Access Point SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

          • Qualcomm IPQ8068
          • Qualcomm IPQ8064
          • Qualcomm IPQ8065
        1/12/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4144
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4144, HMAC #3398
        1645Brocade Communications Systems, Inc.
        130 Holger Way
        San Jose, CA 95134
        USA

        Suneetha Sarala
        ssarala@brocade.com
        408-333-4090

        Viola Chin
        Viola.Chin@brocade.com
        408-333-8000

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • Freescale P2041
        1/12/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4083, DSA #1320, DRBG #1839
        1644Brocade Communications Systems, Inc.
        130 Holger Way
        San Jose, CA 95134
        USA

        Suneetha Sarala
        ssarala@brocade.com
        408-333-4090

        Viola Chin
        Viola.Chin@brocade.com
        408-333-8000

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • ARM Cortex A57
        1/12/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256, SHA-384
          • Prerequisite: SHS #4082, DSA #1319, DRBG #1838
        1643Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (678) 473-2907
        Fax: (678) 473-8470

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
        1/12/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4143
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4143, HMAC #3397
        1642Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (678) 473-2907
        Fax: (678) 473-8470

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
        1/12/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1641Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        JUNOS 17.3R2 RE1800 - OpenSSL

        17.3R2 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon LC5518
        1/12/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #4138
        1640Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1893
        1639Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4137, ECDSA #1318, DRBG #1894, HMAC #3391
        1638Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1893
        1637Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • KAS ECC:
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4136, ECDSA #1317, DRBG #1893, HMAC #3390
        1636Motorola Solutions Inc
        1301 East Algonquin Road
        Schaumburg, IL 60196
        USA

        Amalendu Roy
        aroy@motorolasolutions.com
        847-576-5000

        Ken Fuchs
        Ken.Fuchs@motorolasolutions.com
        847-576-5000

        uMACE KDF

        R03.01.07_KDF (Firmware)


        uMACE KDF implementation for the uMace cryptographic processor which is used in security modules embedded in Motorola Solutions security products.

          • Motorola µMace AT58Z04
        1/12/2018
        • SRTP:
          • AES Key Lengths: 256 (bits)
          • Prerequisite: AES #5077
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-384
          • Prerequisite: SHS #4132, HMAC #3386
        1635Private Machines, Inc
        164 20th Street
        4A-4B
        Brooklyn, NY 11232
        USA

        Sumeet Bajaj
        sumeet@privatemachines.com

        Radu Sion
        sion@privatemachines.com

        Private Machines Enforcer LIBUCL

        L4-1 2.5.13 (Firmware)


        The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

          • MAX32550 Cortex M3
        1/5/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1634Private Machines, Inc
        164 20th Street
        4A-4B
        Brooklyn, NY 11232
        USA

        Sumeet Bajaj
        sumeet@privatemachines.com

        Radu Sion
        sion@privatemachines.com

        Private Machines Enforcer LIBUCL

        L4-1 2.5.13 (Firmware)


        The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

          • MAX32550 Cortex M3
        1/5/2018
        • RSASP1:
          • Modulus Size: 2048 (bits)
          • Padding Algorithms: PKCS 1.5
        1633Private Machines, Inc
        164 20th Street
        4A-4B
        Brooklyn, NY 11232
        USA

        Sumeet Bajaj
        sumeet@privatemachines.com

        Radu Sion
        sion@privatemachines.com

        Private Machines Enforcer LIBUCL

        L4-1 2.5.13 (Firmware)


        The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

          • MAX32550 Cortex M3
        1/5/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-384
          • Prerequisite: SHS #4132, HMAC #3385
        1632SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sanagala
        usanagala@sonicwall.com
        408-962-6248
        Fax: 408-745-9300

        SonicWall Crypto Library

        SonicOS 6.2.5 (Firmware)


        SonicWall Crypto Library

          • Cavium Octeon
        1/5/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 176-1024
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4130, HMAC #3384
        • IKEv2:
          • Derived Keying Material length: 160512-0
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4130, HMAC #3384
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4130
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4130, HMAC #3384
        1631SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sanagala
        usanagala@sonicwall.com
        408-962-6248
        Fax: 408-745-9300

        SonicWall Crypto Library

        SonicOS 6.2.5 (Firmware)


        SonicWall Crypto Library

          • Cavium Octeon
        1/5/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
          • Schemes:
            • Full Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4130, ECDSA #1315, DRBG #1887
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
          • Schemes:
            • dhHybrid1:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
            • dhHybrid1Flow:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
            • dhOneFlow:
              • Key Agreement Roles: Initiator, Responder
            • dhStatic:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4130, DSA #1335, DRBG #1887
        1630Infineon Technologies AG
        Alter Postweg 101
        Augsburg, BY 86159
        Germany

        Roland Ebrecht
        Roland.Ebrecht@infineon.com
        +49-821-25851-68
        Fax: +49-821-25851-40

        Thomas Hoffmann
        Thomas.Hoffmann@infineon.com
        +49-821-25851-24
        Fax: +49-821-25851-40

        Trusted Platform Module 2.0 SLB 9670

        SLB 9670 7.83 (Firmware)


        Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

          • Infineon SLB 9670 security controller IC
        1/5/2018
        • RSADP:
          • Modulus Size: 2048 (bits)
        1629Infineon Technologies AG
        Alter Postweg 101
        Augsburg, BY 86159
        Germany

        Roland Ebrecht
        Roland.Ebrecht@infineon.com
        +49-821-25851-68
        Fax: +49-821-25851-40

        Thomas Hoffmann
        Thomas.Hoffmann@infineon.com
        +49-821-25851-24
        Fax: +49-821-25851-40

        Trusted Platform Module 2.0 SLB 9670

        SLB 9670 7.83 (Firmware)


        Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

          • Infineon SLB 9670 security controller IC
        1/5/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256
        1628Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3428, DSA #1334, DRBG #1283
        1627Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10x Fusion w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3428, DSA #1333, DRBG #1283
        1626Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3425, DSA #1332, DRBG #1280
        1625Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3428, DSA #1331, DRBG #1283
        1624Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3426, DSA #1330, DRBG #1281
        1623Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3423, DSA #1329, DRBG #1278
        1621Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669) 227-3579

        Apple iOS CoreCrypto Module

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        1/5/2018
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3421, DSA #1327, DRBG #1276
        1620Huawei Technologies Co., Ltd
        Huawei Industrial Base, Bantian Longgang
        Shenzhen, Guangdong 518129
        China

        SPENCER HE
        heshunbin@huawei.com
        +86-755-28979041

        EulerOS 2.0

        EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

          • Intel Xeon w/ EulerOS 2.0
        1/5/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        • KAS ECC:
          • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4126, ECDSA #1312, DRBG #1884
        1619Silver Peak Systems, Inc.
        2860 De La Cruz Blvd.
        Santa Clara, CA 95050
        USA

        Damon Ennis
        (408) 935-1836

        Anusha Vaidyanathan
        (408) 935 1800
        Fax: (408) 588-1608

        Silver Peak Cryptographic library

        1.0 (Firmware)


        Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

          • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
          • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
        1/5/2018
        • IKEv1:
          • Methods: Pre-shared Key
          • Pre-shared Key Length: 8-224
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 (bits)
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 (bits)
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4125, HMAC #3380
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4125
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4125, HMAC #3380
        1618Silver Peak Systems, Inc.
        2860 De La Cruz Blvd.
        Santa Clara, CA 95050
        USA

        Damon Ennis
        (408) 935-1836

        Anusha Vaidyanathan
        (408) 935 1800
        Fax: (408) 588-1608

        Silver Peak Cryptographic library

        1.0 (Firmware)


        Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

          • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
          • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
        1/5/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1617Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
        12/22/2017
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384
        1616Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
        12/22/2017
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4124
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4124, HMAC #3379
        1615DocuSign
        221 Main St.
        Suite 1000
        San Francisco, CA 94105
        USA

        Ezer.Farhi@docusign.com
        Ezer.Farhi@docusign.com
        972-3-9279529

        DocuSign-SA-TLS

        8.5 (Firmware)


        DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

          • Intel® Xeon Quad-Core
        12/22/2017
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256
          • Prerequisite: SHS #4123, HMAC #3378
        1614Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Core M w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1874
        1613Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i5 w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1873
        1612Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Xeon w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1872
        1611A10 Networks, Inc.
        3 West Plumeria Drive
        San Jose, CA 95134
        USA

        John Chiong
        +1 408 325-8668

        A10 Networks Data Plane FIPS Library CNN3550

        CNN3550


        The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

          • N/A
        12/22/2017
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        1610A10 Networks, Inc.
        3 West Plumeria Drive
        San Jose, CA 95134
        USA

        John Chiong
        +1 408 325-8668

        A10 Networks Data Plane FIPS Library CNN3530

        CNN3530


        The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

          • N/A
        12/22/2017
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        1609Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i7 w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1871
        1608Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i7 w/ macOS 10.13
        12/22/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4119, ECDSA #1307, DRBG #1871
        1607Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Core M w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1870
        1606Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Core M w/ macOS 10.13
        12/22/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
          • Prerequisite: SHS #4118, ECDSA #1306, DRBG #1870
        1605Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Xeon w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1869
        1604Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Xeon w/ macOS 10.13
        12/22/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4117, ECDSA #1305, DRBG #1869
        1603Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i5 w/ macOS 10.13
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1868
        1602Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i5 w/ macOS 10.13
        12/22/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4116, ECDSA #1304, DRBG #1868
        1601Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS Version 17.3R2 - OpenSSL

        17.3R2 (Firmware)


        The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

          • Intel Xeon D-1531
          • Intel Xeon D
        12/22/2017
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4112
        1600Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
        12/22/2017
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384
        1599Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
        12/22/2017
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4110
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4110, HMAC #3365
        1598SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.0 for TZ, NSA and SuperMassive

        FW Version 6.5.0 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium OCTEON III (CN7XXX)
          • Cavium OCTEON II (CN6XXX)
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #1865
        1597SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.0 for TZ, NSA and SuperMassive

        FW Version 6.5.0 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium OCTEON II (CN6XXX)
          • Cavium OCTEON III (CN7XXX)
        12/22/2017
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 176-1024
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 (bits)
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4109, HMAC #3364
        • IKEv2:
          • Derived Keying Material length: 160-512
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 (bits)
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 (bits)
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4109, HMAC #3364
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4109
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4109, HMAC #3364
        1596SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.0 for TZ, NSA and SuperMassive

        FW Version 6.5.0 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium OCTEON III (CN7XXX)
          • Cavium OCTEON II (CN6XXX)
        12/22/2017
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Full Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4109, ECDSA #1299, DRBG #1865, HMAC #3364
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • dhHybrid1:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256, SHA-384, SHA-512
                • FC:
                  • SHA: SHA-256, SHA-384, SHA-512
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256, SHA-384, SHA-512
                • FC:
                  • SHA: SHA-256, SHA-384, SHA-512
            • dhHybrid1Flow:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256, SHA-384, SHA-512
                • FC:
                  • SHA: SHA-256, SHA-384, SHA-512
            • dhOneFlow:
              • Key Agreement Roles: Initiator, Responder
            • dhStatic:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4109, DSA #1325, DRBG #1865, HMAC #3364
        1595Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        CiscoSSL FIPS Object Module (Assembler)

        6.2


        The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''''''s networking and collaboration products.

          • Cavium Octeon MIPS64 w/ Linux 3.10
        12/22/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3471, ECDSA #1254, DRBG #1317
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #3471, DSA #1130, DRBG #1317
        1594Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1861
        1593Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 GnuTLS C Implementation

        R7-2.0.0


        GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

          • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        12/22/2017
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4105, HMAC #3360
        1592Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 GnuTLS C Implementation

        R7-2.0.0


        GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

          • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        12/22/2017
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4105, ECDSA #1297, DRBG #1859
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4105, DSA #1324, DRBG #1859
        1591Extreme Networks
        6480 Via Del Ora
        San Jose, CA 95119
        USA

        Craig J Ficik
        cficik@extremenetworks.com
        603-9525922
        Fax: 404-806-5377

        Extreme Networks Summit Series

        22.3 (Firmware)


        Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

          • Cavium Octeon II
        12/15/2017
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #4104
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-512
          • Prerequisite: SHS #4104, HMAC #3359
        1590Extreme Networks
        6480 Via Del Ora
        San Jose, CA 95119
        USA

        Craig J Ficik
        cficik@extremenetworks.com
        603-952-5922
        Fax: 404-806-5377

        Extreme Networks Summit Series

        22.3 (Firmware)


        Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

          • Intel Atom C series
        12/15/2017
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #4103
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-512
          • Prerequisite: SHS #4103, HMAC #3358
        1589Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1856
        1588Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1855
        1587Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10X Fusion w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1854
        1586Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1853
        1585Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1852
        1584Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1851
        1583Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8 w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1850
        1582Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        12/15/2017
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1849
        1581SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        Net-SNMP

        5.6.1 (Firmware)


        Net-snmp-5.6.1 with minor patches

          • Intel Core i5 with AES-NI
          • Intel Xeon with AES-NI
        12/15/2017
        • SNMP:
        1580SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        OpenSSL

        1.0.2k (Firmware)


        OpenSSL 1.0.2k with minor patches

          • Intel Core i5 with AES-NI
          • Intel Xeon with AES-NI
        12/15/2017
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256
          • Prerequisite: SHS #4088, HMAC #3343
        1579SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        OpenSSH

        openssh-7.4p1 (Firmware)


        SSH may generate keys of any size. Default is 2048. Open source version slightly modified to read our CSPs and perform necessary testing and validation.

          • Intel Core i5 with AES-NI
          • Intel Xeon with AES-NI
        12/15/2017
        • SSH:
          • SHA Functions: SHA-256
          • Prerequisite: SHS #4088
        1578OpenSSL Validation Services, Inc.
        1829 Mount Ephraim Road
        Adamstown, MD 21710
        USA

        Steve Marquess
        info@openssl.com
        301-874-2571

        OpenSSL FIPS Object Module

        2.0.16


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
          • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
        12/15/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: B-283, K-283, P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: B-409, K-409, P-384
                  • SHA: SHA-384, SHA-512
          • Prerequisite: SHS #3681, ECDSA #1091, DRBG #1451
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3681, DSA #1195, DRBG #1451
        1577Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna IS Cryptographic Library

        6.3.2 (Firmware)


        The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

          • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
        12/15/2017
        • ECDSA SigGen:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #1704
        1576McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Andy Nissen
        andy.nissen@intel.com
        651-770-6151

        McAfee Advanced Threat Defense

        4.0


        A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

          • Intel Xeon w/ Linux 4.4.27
        12/8/2017
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #1801, ECDSA #415, DRBG #822
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #1801, DSA #1322, DRBG #822
        1575SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        OpenJDK

        1.8.0-jdk8u152-b01-20170213 (Firmware)


        CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

          • Intel Xeon with AES-NI
          • Intel Core i5 with AES-NI
        12/8/2017
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256
          • Prerequisite: SHS #4089, HMAC #3344
        1574Certes Networks, Inc.
        300 Corporate Center Drive
        Suite 140
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        CryptoFlow Net Creator Java Crypto Module

        1.0


        The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

          • Intel Xeon E3-1270v5 w/ CentOS 6.7
        12/8/2017
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384
        1573Certes Networks, Inc.
        300 Corporate Center Drive
        Suite 140
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        CryptoFlow Net Creator Java Crypto Module

        1.0


        The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

          • Intel Xeon E3-1270v5 w/ CentOS 6.7
        12/8/2017
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4087, HMAC #3342
        1572RSA Security LLC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        FIPS Program
        fips-program@rsa.com

        RSA BSAFE® Crypto-J JSAFE and JCE Software Module

        6.2.4


        RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

          • Intel Core i5 w/ Windows 10 (64-bit)
          • Intel Xeon w/ CentOS 7.3
          • Qualcomm Snapdragon w/ Android 7.1.2
        12/8/2017
        • RSADP:
          • Modulus Size: 2048 (bits)
        1571RSA Security LLC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        FIPS Program
        fips-program@rsa.com

        RSA BSAFE® Crypto-J JSAFE and JCE Software Module

        6.2.4


        RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

          • Intel Core i5 w/ Windows 10 (64-bit)
          • Qualcomm Snapdragon w/ Android 7.1.2
          • Intel Xeon w/ CentOS 7.3
        12/8/2017
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4085, HMAC #3340
        1570RSA Security LLC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        FIPS Program
        fips-program@rsa.com

        RSA BSAFE® Crypto-J JSAFE and JCE Software Module

        6.2.4


        RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

          • Intel Core i5 w/ Windows 10 (64-bit)
          • Intel Xeon w/ CentOS 7.3
          • Qualcomm Snapdragon w/ Android 7.1.2
        12/8/2017
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1569Brocade Communications Systems, Inc.
        130 Holger Way
        San Jose, CA 95134
        USA

        Suneetha Sarala
        ssarala@brocade.com
        408-333-4090

        Chris Marks
        marksc@brocade.com
        408-333-0480

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • Freescale P2041
        12/8/2017
        • SNMP:
          • SSH:
            • SHA Functions: SHA-1, SHA-256
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
          1568Brocade Communications Systems, Inc.
          130 Holger Way
          San Jose, CA 95134
          USA

          Suneetha Sarala
          ssarala@brocade.com
          408-333-4090

          Viola Chin
          Viola.Chin@brocade.com
          408-333-8000

          BRCD-IP-CRYPTO-VER-4.0

          BRCD-IP-CRYPTO-VER-4.0 (Firmware)


          Firmware algorithm for the Brocade FastIron Series

            • ARM Cortex A57
          12/8/2017
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4082
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #4082, HMAC #3337
          1567Brocade Communications Systems, Inc.
          130 Holger Way
          San Jose, CA 95134
          USA

          Suneetha Sarala
          ssarala@brocade.com
          408-333-4090

          Chris Marks
          marksc@brocade.com
          408-333-0480

          BRCD-IP-CRYPTO-VER-4.0

          BRCD-IP-CRYPTO-VER-4.0 (Firmware)


          Firmware algorithm for the Brocade FastIron Series

            • ARM Cortex A9
          12/8/2017
          • IKEv2:
            • Derived Keying Material length: 1536-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4081, HMAC #3336
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4081
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #4081, HMAC #3336
          1566Brocade Communications Systems, Inc.
          130 Holger Way
          San Jose, CA 95134
          USA

          Suneetha Sarala
          ssarala@brocade.com
          408-333-4090

          Chris Marks
          marksc@brocade.com
          408-333-0480

          BRCD-IP-CRYPTO-VER-4.0

          BRCD-IP-CRYPTO-VER-4.0 (Firmware)


          Firmware algorithm for the Brocade FastIron Series

            • ARM Cortex A9
          12/8/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4081, ECDSA #1282, DRBG #1837
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256, SHA-384
            • Prerequisite: SHS #4081, DSA #1318, DRBG #1837
          1565Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Luna K6 Cryptographic Library

          6.24.6 (Firmware)


          The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

            • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
          12/8/2017
          • ECDSA SigGen:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1704
          1564Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

            • Apple A10X w/ tvOS 11 Fusion
          11/30/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1832
          1563Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

            • Apple A10X w/ tvOS 11 Fusion
          11/30/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4076, ECDSA #1279, HMAC #3331
          1562Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Luna G5 Cryptographic Library

          6.24.6 (Firmware)


          The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

            • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
          11/30/2017
          • ECDSA SigGen:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1704
          1561Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto Virtual

          F6.2


          The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

            • Intel Xeon D series w/ NFVIS
            • Intel Xeon E series w/ ESXi 6.0
            • Intel Xeon D series w/ ESXi 6.0
            • Intel Xeon E series w/ NFVIS
            • Intel Xeon E series w/ ESXi 5.5
            • Intel Xeon Scalable series w/ ESXi 6.0
          11/30/2017
          • IKEv2:
            • Derived Keying Material length: 800-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4074, HMAC #3329
          • SSH:
            • SHA Functions: SHA-1
            • Prerequisite: SHS #4074
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4074, HMAC #3329
          1560Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto Virtual

          F6.2


          The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

            • Intel Xeon E series w/ ESXi 6.0
            • Intel Xeon D series w/ ESXi 6.0
            • Intel Xeon D series w/ NFVIS
            • Intel Xeon E series w/ ESXi 5.5
            • Intel Xeon E series w/ NFVIS
            • Intel Xeon Scalable series w/ ESXi 6.0
          11/30/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4074, ECDSA #1277, DRBG #1828
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4074, DSA #1314, DRBG #1828
          1559Cavium, Inc.
          2315 N 1st Street
          San Jose, CA 95131
          USA

          Tejinder Singh
          Tejinder.Singh@caviumnetworks.com
          408-943-7403
          Fax: 408-577-1992

          Phanikumar Kancharla
          Pkkancharla@caviumnetworks.com
          408-943-7496

          ngfips_ecc

          CN52XX 1.0.1 (Firmware)


          The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

            • Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
          11/30/2017
          • ECDSA SigGen:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #32
          1558Brocade Communications Systems LLC
          120 Holger Way
          San Jose, CA 95110
          USA

          Hamid Sabouti
          hamid.sobouti@broadcom.com
          408-333-4150
          Fax: 408-333-3844

          Brocade Fabric OS FIPS Cryptographic Module

          8.2.0


          Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

            • e500mc w/ Fabric Operating System(FOS) v8.2.0
          11/30/2017
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4071
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #4071, HMAC #3328
          1557Brocade Communications Systems LLC
          120 Holger Way
          San Jose, CA 95110
          USA

          Hamid Sabouti
          hamid.sobouti@broadcom.com
          408-333-4150
          Fax: 408-333-3844

          Brocade Fabric OS FIPS Cryptographic Module

          8.2.0


          Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

            • e500v2 w/ Fabric Operating System(FOS) v8.2.0
            • e500mc w/ Fabric Operating System(FOS) v8.2.0
          11/30/2017
          • KAS ECC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4071, ECDSA #1275, DRBG #1827
          • KAS FFC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4071, DSA #2583, DRBG #1827
          1556SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS on x86 with AES-NI

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4070, HMAC #3327
          1555SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS on x86 with AES-NI

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4070, ECDSA #1274, DRBG #1826
          • KAS FFC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-224
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4070, DSA #1311, DRBG #1826
          1554SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS on x86 without AES-NI

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4069, HMAC #3326
          1553SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS on x86 without AES-NI

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4069, ECDSA #1273, DRBG #1825
          • KAS FFC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-224
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4069, DSA #1310, DRBG #1825
          1552SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS z13

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4068, HMAC #3325
          1551SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE NSS z13

          2.0


          SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          11/30/2017
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4068, ECDSA #1272, DRBG #1824
          • KAS FFC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-224
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4068, DSA #1309, DRBG #1824
          1550Lexmark International, Inc.
          740 West New Circle Road
          Lexington, KY 40550
          USA

          Graydon Dodson
          gdodson@lexmark.com
          +1 859 232-6483

          Crypto Module (user)

          3.2


          Lexmark Crypto Module (user)

            • Marvell 88PA6270C0 w/ Lexmark Linux v4
          11/22/2017
          • IKEv1:
            • Methods: Digital Signature, Public Key Encryption
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-256, SHA-512
            • Prerequisite: SHS #4063, HMAC #3320
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-256
            • Prerequisite: SHS #4063, HMAC #3320
          1549Lexmark International, Inc.
          740 West New Circle Road
          Lexington, KY 40550
          USA

          Graydon Dodson
          gdodson@lexmark.com
          +1 859 232-6483

          Crypto Module (user)

          3.2


          Lexmark Crypto Module (user)

            • Marvell MV78460-B0 w/ Lexmark Linux v4
          11/22/2017
          • ECDSA SigGen:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1821
          1548Lexmark International, Inc.
          740 West New Circle Road
          Lexington, KY 40550
          USA

          Graydon Dodson
          gdodson@lexmark.com
          +1 859 232-6483

          Crypto Module (user)

          3.2


          Lexmark Crypto Module (user)

            • Marvell MV78460-B0 w/ Lexmark Linux v4
          11/22/2017
          • IKEv1:
            • Methods: Digital Signature, Public Key Encryption
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-256, SHA-512
            • Prerequisite: SHS #4064, HMAC #3321
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-256
            • Prerequisite: SHS #4064, HMAC #3321
          1547Lexmark International, Inc.
          740 West New Circle Road
          Lexington, KY 40550
          USA

          Graydon Dodson
          gdodson@lexmark.com
          +1 859 232-6483

          Crypto Module (user)

          3.2


          Lexmark Crypto Module (user)

            • Marvell 88PA6270C0 w/ Lexmark Linux v4
          11/22/2017
          • ECDSA SigGen:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1820
          1546Bomgar Corporation
          578 Highland Colony Parkway
          Paragon Centre, Suite 300
          Ridgeland, MS 39157
          USA

          Faye Santangelo
          FSantangelo@bomgar.com
          6016078322

          Bomgar CryptoEngine

          2.0.13 (Firmware)


          The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

            • Intel® Xeon E5-2640 v3
          11/22/2017
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3912, HMAC #3180
          1545Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6520

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Apple A10 on iOS 10.x
          11/17/2017
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1
            • Prerequisite: SHS #4046, HMAC #3304
          • SNMP:
          • SRTP:
            • AES Key Lengths: 128, 192, 256 (bits)
            • Prerequisite: AES #4956
          • SSH:
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4046
          1544Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6520

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Apple A10 on iOS 10.x
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-512
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-512
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: AES #4956, AES #4956, SHS #4046, ECDSA #1265, DRBG #1787, HMAC #3304
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4046, DSA #1305, DRBG #1787
          1543Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

          15.1 X49-D110 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Cavium Octeon III (CN7130)
          11/17/2017
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #4033
          1542Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version 15.1X49 - SRX345 - Authentec

          15.1 X49-D110 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Cavium Octeon III (CN7130)
          11/17/2017
          • IKEv1:
            • Methods: Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 8-256
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-224, SHA-256
            • Prerequisite: SHS #4030, HMAC #3289
          • IKEv2:
            • Derived Keying Material length: 1136-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4030, HMAC #3289
          1541SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Strongswan Cryptographic Module

          2.0


          Strongswan is an open-source IPsec implementation for Linux kernel. The module supplies cryptographic support of the IKEv1 and IKEv2 protocols for the SUSE Linux Enterprise Server user space. This test covers the SP800-135 IKEv2 KDF testing.

            • IBM z13 w/ SUSE Linux Enterprise Server 12 SP2
          11/17/2017
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Diffie-Hellman shared secret:
                • Length: 8192 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3788, HMAC #3059
          1540Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations

          6.3.9600


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #489
          1539SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Strongswan Cryptographic Module

          2.0


          Strongswan is an open-source IPsec implementation for Linux kernel. The module supplies cryptographic support of the IKEv1 and IKEv2 protocols for the SUSE Linux Enterprise Server user space. This test covers the SP800-135 IKEv2 KDF testing.

            • Intel Xeon E5 Family w/ SUSE Linux Enterprise Server 12 SP2
          11/17/2017
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Diffie-Hellman shared secret:
                • Length: 8192 (bits)
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3770, HMAC #3044
          1538Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A11 Bionic w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4028, DRBG #1767
          1537Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A11 Bionic w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4028, ECDSA #1262, DRBG #1767, HMAC #3288
          1536Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A10X Fusion w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1766
          1535Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple 10X Fusion w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4027, ECDSA #1261, DRBG #1766, HMAC #3287
          1534Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A9X w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1765
          1533Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A9X w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4026, ECDSA #1260, DRBG #1765, HMAC #3286
          1532Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A10 Fusion w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1764
          1531Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A10 Fusion w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4025, ECDSA #1259, DRBG #1764, HMAC #3285
          1530Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A8X w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1762
          1529Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A8X w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4024, ECDSA #1258, DRBG #1762, HMAC #3284
          1528Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A9 w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4023, DRBG #1761
          1527Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A9 w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4023, ECDSA #1257, DRBG #1761, HMAC #3283
          1526McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com

          McAfee NSP NS Crypto Lib

          n.a 2.0.5_9.1.17.2 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliance

            • Intel Atom C Family
            • Intel Xeon E5 Family
          11/17/2017
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #3962, HMAC #3221
          1525Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A7 w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1759
          1524Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A7 w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4022, ECDSA #1256, DRBG #1759
          1523Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A8 w/ iOS 11
          11/17/2017
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1758
          1522Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

            • Apple A8 w/ iOS 11
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • One Pass DH:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4021, ECDSA #1255, DRBG #1758
          1521Cisco Systems, Inc.
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto

          F6.2 (Firmware)


          The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

            • Intel Atom C2xxx Family, Intel Xeon 34xx Family
            • Intel Xeon E Family
            • Intel Xeon D Family
          11/17/2017
          • IKEv2:
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4012
          • SSH:
            • SHA Functions: SHA-1
            • Prerequisite: SHS #4012
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4012
          1520Cisco Systems, Inc.
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto

          F6.2 (Firmware)


          The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

            • Intel Atom C2xxx Family, Intel Xeon 34xx Family
            • Intel Xeon E Family
            • Intel Xeon D Family
          11/17/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4012, ECDSA #1254, DRBG #1735
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4012, DSA #1304, DRBG #1735
          1519Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub Virtual TPM Implementations

          10.0.15063.674


          The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1518Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

          10.0.16299


          The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1517Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub MsBignum Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          1516Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub MsBignum Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1515Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub MsBignum Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1732
          1514Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub SymCrypt Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: SHS #4011, DRBG #1732
          1513Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub SymCrypt Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          1512Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub SymCrypt Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1511Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Microsoft Surface Hub SymCrypt Cryptographic Implementations

          10.0.15063.674


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
          11/17/2017
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4011, HMAC #3269
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4011, HMAC #3269
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4011, HMAC #3269
          1510Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

          10.0.15254


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1731
          1509Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

          10.0.15254


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          1508Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

          10.0.15254


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1507Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

          10.0.15254


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4010, HMAC #3268
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4010, HMAC #3268
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4010, HMAC #3268
          1506Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

          10.0.15254


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1731
          1505Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

          10.0.15254


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1504Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

          10.0.15254


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1503Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

          10.0.16299


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
          11/17/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1730
          1502Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

          10.0.16299


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
          11/17/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          1501Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

          10.0.16299


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
          11/17/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1500Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Hridya Valakkadavil Thilakan
          hridya-valakkadavil.thilakan@hpe.com

          Aprana Shrivastava
          aprana.shrivastava@hpe.com

          HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

          4.71 (Firmware)


          The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

            • PowerPC 440EPx
          11/9/2017
          • ECC CDH:
            • Primitive
            • Curves: P-224, P-256, P-384, P-521
          1499Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

          10.0.16299


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          11/9/2017
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1730
          1498Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

          10.0.16299


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          11/9/2017
          • RSADP:
            • Modulus Size: 2048 (bits)
          1497Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

          10.0.16299


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          11/9/2017
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1496Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

          10.0.16299


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
          11/9/2017
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4009, HMAC #3267
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4009, HMAC #3267
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4009, HMAC #3267
          1495Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 6500 Packet Optical Family

          12.3


          Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

            • PowerQUICC II w/ VxWorks 6.3
            • PowerQUICC II w/ VxWorks 6.1
          11/3/2017
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3992
          1494Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 6500 Packet Optical Family

          12.3


          Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

            • PowerQUICC II w/ VxWorks 6.1
            • PowerQUICC II w/ VxWorks 6.3
          11/3/2017
          • KAS ECC:
            • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #3992, ECDSA #1244, DRBG #1706
          • KAS FFC:
            • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #3992, DSA #1300, DRBG #1706
          1493SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSH

          2.0


          OpenSSH is the standard SSH implementation.

            • IBM z13 w/ SUSE Linux Enterprise Server 12 SP2
          11/3/2017
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3788
          1492SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSH

          2.0


          OpenSSH is the standard SSH implementation.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          11/3/2017
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3770
          1491Hewlett Packard Enterprise
          8000 Foothills Blvd.
          Roseville, CA 95747
          USA

          Susan Scotten
          susan.scotten@hpe.com
          1-916-540-1109

          Aruba Campus Switch Series Crypto Library

          16.04 (Firmware)


          Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

            • Dual Core ARM Coretex
            • Freescale P2020 Dual Core
          11/3/2017
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1
            • Prerequisite: SHS #3991
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-512
            • Prerequisite: SHS #3991, HMAC #3249
          1490Hewlett Packard Enterprise
          8000 Foothills Blvd.
          Roseville, CA 95747
          USA

          Susan Scotten
          susan.scotten@hpe.com
          1-916-540-1109

          Aruba Campus Switch Series Crypto Library

          16.04 (Firmware)


          Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

            • Freescale P2020 Dual Core
            • Dual Core ARM Coretex
          11/3/2017
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3991, ECDSA #1243, DRBG #1705
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-384
            • Prerequisite: SHS #3991, DSA #1299, DRBG #1705
          1489Guardtime
          5151 California Ave.
          Suite 210
          Irvine, CA 92617
          USA

          Christian Bravo
          christian.bravo@guardtime.com
          310-227-6558

          Guardtime Cryptographic Support Library (CSL) Direct Extended

          1.0.0 (Firmware)


          Cryptographic library for Guardtime products.

            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
          11/3/2017
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3697, HMAC #2979
          1488Guardtime
          5151 California Ave.
          Suite 210
          Irvine, CA 92617
          USA

          Christian Bravo
          christian.bravo@guardtime.com
          310-227-6558

          Guardtime Cryptographic Support Library (CSL) Direct Extended

          1.0.0 (Firmware)


          Cryptographic library for Guardtime products.

            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
          11/3/2017
          • KAS ECC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #3697, ECDSA #1095, DRBG #1472
          1487IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00KP899

          Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          11/3/2017
          • ECDSA SigGen:
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1674
          1486IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00CW683

          Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          11/3/2017
          • ECDSA SigGen:
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #1675
          1485Elster
          TBD
          TBD, TBD 307210
          Romania

          VLADIMIR DIATLOV
          VLADIMIR.DIATLOV@Honeywell.com
          +40 374 475 828
          Fax: +40 256 493 737

          SMETS2 AS302P

          1.1 (Firmware)


          The algorithms to be tested are implemented in an Electricity smart meter, for deployment in the UK Smart Metering Implementation Programme.

            • ARM 32-bit Cortex-M3
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256
          1484F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP vCMP on B4450 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • SSH:
            • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3983
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3983, HMAC #3242
          1483F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP vCMP on B4450 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3983, ECDSA #1238, DRBG #1700
          1481Thales e-Security Inc.
          900 South Pine Island Road
          Suite 710
          Plantation, FL 33324
          USA

          Natalya Robert
          natalya.robert@thalesesec.com
          954-888-6268

          Robert Burns
          robert.burns@thalesesec.con
          954-888-6215

          Vormetric Data Security Manager Module

          6.0.0 (Firmware)


          The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

            • Intel Xeon
          11/3/2017
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3986, HMAC #3245
          1480F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3981, HMAC #3240
          1479F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3981, ECDSA #1236, DRBG #1698
          1478F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP 10350F TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3980, HMAC #3239
          1477F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP 10350F TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3980, ECDSA #1235, DRBG #1697
          1476F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4450N TMM Implementation

          tbd 13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3979, HMAC #3238
          1475F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4450N TMM Implementation

          tbd 13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3979, ECDSA #1234, DRBG #1696
          1474F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3978, HMAC #3237
          1473F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038
          Fax: ~

          BigIP B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3978, ECDSA #1233, DRBG #1695
          1472F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B4450 TMM Implementation

          tbd 13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3977, HMAC #3236
          1471F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B4450 TMM Implementation

          tbd 13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3977, ECDSA #1232, DRBG #1694
          1470F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3976, HMAC #3235
          1469F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3976, ECDSA #1231, DRBG #1693
          1468F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i7820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1650
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3973, HMAC #3232
          1467F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i7820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1650
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3973, ECDSA #1228, DRBG #1690
          1466F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i5820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3975, HMAC #3234
          1465F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i5820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          1464F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B7000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E3-1275
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3974, HMAC #3233
          1463F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B7000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E3-1275
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3974, ECDSA #1229, DRBG #1691
          1462F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3972, HMAC #3231
          1461F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3972, ECDSA #1227, DRBG #1689
          1460F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B4450N OpenSSL Software Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • SSH:
            • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3971
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #3971, HMAC #3230
          1459F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B4450N OpenSSL Software Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          • KAS ECC:
            • Functions: Key Pair Generation, Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #3971, ECDSA #1226, DRBG #1688
          1458
          10/27/2017
            1457F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B2250 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3970
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3970, HMAC #3229
            1456F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B2250 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3970, ECDSA #1225, DRBG #1687
            1455F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP 10350F OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3969
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3969, HMAC #3228
            1454F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP 10350F OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3969, ECDSA #1224, DRBG #1686
            1453F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP vCMP on B2250 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3968
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3968, HMAC #3227
            1452F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP vCMP on B2250 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-2658
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3968, ECDSA #1223, DRBG #3227
            1451F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B4000 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3967
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3967, HMAC #3226
            1450F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B4000 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3967, ECDSA #1222, DRBG #1684
            1449F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i4000 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1630
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3966
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3966, HMAC #3225
            1448F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i4000 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1630
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3966, ECDSA #1221, DRBG #1683
            1447F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i7820 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1650
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3965
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3965, HMAC #3224
            1446F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i7820 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1650
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3965, ECDSA #1220, DRBG #1682
            1445F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i5820 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1630
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3964
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3964, HMAC #3223
            1444F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP i5820 OpenSSL Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

              • Intel(R) Xeon(R) CPU E5-1630
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3964, ECDSA #1219, DRBG #1681
            1443F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B7000 OpenSSL Software Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

              • Intel(R) Xeon(R) CPU E3-1275
            10/27/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3963
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3963, HMAC #3222
            1442F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            John Hughes
            j.hughes@f5.com
            206-272-6038

            BIGIP B7000 OpenSSL Software Implementation

            13.1.0 (Firmware)


            F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

              • Intel(R) Xeon(R) CPU E3-1275
            10/27/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3963, ECDSA #1218, DRBG #1680
            1441McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com
            972.963.7326

            McAfee NSP NS SSH Lib

            n.a 6.4_9.1.17.2 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliance

              • Intel Atom C Family
              • Intel Xeon E5 Family
            10/20/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3960, SHS #3962
            1440Synopsys, Inc.
            690 East Middlefield Road
            Mountain View, CA 94043
            USA

            Dana Neustadter
            danan@synopsys.com
            +1(613)595-9836

            DWC Cryptography Software Library

            4.2.0


            The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

              • ARC® EM7D Processor with CryptoPack w/ n/a
            10/20/2017
            • ECDSA SigGen:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1676
            1439Synopsys, Inc.
            690 East Middlefield Road
            Mountain View, CA 94043
            USA

            Dana Neustadter
            danan@synopsys.com
            +1(613)595-9836

            DWC Cryptography Software Library

            4.2.0


            The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

              • ARC® EM7D Processor with CryptoPack w/ n/a
            10/20/2017
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1438Infoblox
            3111 Coronado Drive
            Santa Clara, CA 95054
            USA

            Dave Funk
            dfunk@infoblox.com
            408-986-5591

            NIOS Cryptographic Library

            2.0 (Firmware)


            Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

              • Intel Xeon
              • Intel Xeon w/ VMware ESXi 5
              • Intel Xeon w/ VMware ESXi 6
            10/13/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3953
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3953, HMAC #3215
            1437Infoblox
            3111 Coronado Drive
            Santa Clara, CA 95054
            USA

            Dave Funk
            dfunk@infoblox.com
            408-986-5591

            NIOS Cryptographic Library

            2.0 (Firmware)


            Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

              • Intel Xeon w/ VMware ESXi 5
              • Intel Xeon
              • Intel Xeon w/ VMware ESXi 6
            10/13/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-224
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3953, ECDSA #1213, DRBG #1671
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3953, DSA #1295, DRBG #1671
            1436McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com
            972.963.7326

            McAfee NSP NS SSH Lib

            6.4_9.1.17.1 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliances

              • Intel Xeon Gold Family
            10/13/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3946
            1435McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com
            972.963.7326

            McAfee NSP NS Crypto Lib

            2.0.5_9.1.17.1 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliances

              • Intel Xeon Gold Family
            10/13/2017
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3946, HMAC #3208
            1434SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            SafeLogic Inside Sales
            sales@safelogic.com
            (844)436-2797

            CryptoComply® Server Engine

            2.1


            CryptoComply® Server is a standards-based “Drop-in Compliance” solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply® offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

              • Intel i7 w/ CentOS 6.3
            10/13/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #1954, ECDSA #709, DRBG #281, HMAC #1391
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #1954, DSA #709, DRBG #281, HMAC #1391
            1433Extreme Networks
            6480 Via Del Ora
            San Jose, CA 95119
            USA

            Craig J Ficik
            cficik@extremenetworks.com
            770-650-8656
            Fax: 404-806-5377

            Matthew Roman
            maroman@extremenetworks.com
            603-952-5828

            Extreme Networks Summit Series

            22.3 (Firmware)


            ExtremeXOS has a robust set of Layer 2 and Layer 3 control protocols, provides a flexible architecture for highly resilient networks and has been designed to support the nextgeneration Internet Protocol, IPv6.

              • Cavium Octeon II
            10/6/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3941
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3941, HMAC #3204
            1432Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Bill Shelton
            bshelton@juniper.net
            408-745-2000
            Fax: 408-745-2100

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS Version 17.3R1-OpenSSL

            17.3R1 (Firmware)


            The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

              • Intel Xeon D-1531
            10/6/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #3939
            1431Gemalto
            20 Colonnade Road, Suite 200
            Ottawa, ON K2E7M6
            Canada

            Security and Certifications Team
            SecurityCertifications@gemalto.com

            Luna K7 Accelerated Cryptographic Library

            7.0.1 (Firmware)


            The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

              • PowerPC 476
            9/29/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1430Extreme Networks
            6480 Via Del Ora
            San Jose, CA 95119
            USA

            Craig J Ficik
            cficik@extremenetworks.com
            770-650-8656
            Fax: 404-806-5377

            Matthew Roman
            maroman@extremenetworks.com
            603-952-5828

            Extreme Networks Summit Series

            22.3 (Firmware)


            ExtremeXOS has a robust set of Layer 2 and Layer 3 control protocols, provides a flexible architecture for highly resilient networks and has been designed to support the nextgeneration Internet Protocol, IPv6.

              • Intel Atom C series
            9/29/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3932
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3932, HMAC #3195
            1429MediaTek Inc.
            No.1, Dusing Rd. 1, Hsinchu Science Park
            Hsinchu, Taiwan 30078
            Taiwan

            William Cheng
            William.cheng@mediatek.com
            +1-858-731-9200
            Fax: +1-858-731-9201

            MingHsien Hsieh
            minghsien.hsieh@mediatek.com
            +886-3-567-0766
            Fax: +886-3-578-7610

            MTK CryptoCore V1.0 Secure Core

            MTK CryptoCoreV1.0 S Core sw-cc710tee-2.0.5.1279 (Firmware)


            The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

              • ARM TrustZone-Enabled Cortex-A Series CPU
            9/29/2017
            • ECC CDH:
              • Primitive
              • Curves: P-224, P-256, P-384, P-521
            1428MediaTek Inc.
            No.1, Dusing Rd. 1, Hsinchu Science Park
            Hsinchu, Taiwan 30078
            Taiwan

            William Cheng
            William.cheng@mediatek.com
            +1-858-731-9200
            Fax: +1-858-731-9201

            MingHsien Hsieh
            minghsien.hsieh@mediatek.com
            +886-3-567-0766
            Fax: +886-3-578-7610

            MTK CryptoCore V1.0 Secure Core

            MTK CryptoCoreV1.0 S Core


            The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

              • N/A
            9/26/2017
            • ANS 9.63:
              • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3927
            1427Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 6 Libreswan

            R6-1.0.0


            Oracle Linux 6 Libreswan Cryptographic Module is a framework for providing cryptographic services to other network entities implementing the IKEv1 and IKEv2 protocols.

              • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            9/26/2017
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 256-512
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3918, HMAC #3184
            • IKEv2:
              • Derived Keying Material length: 1056-3072
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3918, HMAC #3184
            1426Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Bhadresh Udani
            bhadresh.udani@hpe.com
            +91 9886399320

            Premnath M
            premnath.mangal@hpe.com
            +91 9845369405

            HPE BladeSystem c-Class Virtual Connect Firmware SNMP Utility 5.7.1

            4.65 (Firmware)


            This is the modified open source NetSNMP utility for SNMP MIB and SNMPv3 support.

              • FreeScale MPC8535
            9/26/2017
            • SNMP:
            1425Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Bhadresh Udani
            bhadresh.udani@hpe.com
            +91 9886399320

            Premnath M
            premnath.mangal@hpe.com
            +91 9845369405

            HPE BladeSystem c-Class Virtual Connect Firmware SSH Utility 5.9p1

            4.65 (Firmware)


            This is the modified open source OpenSSH network utility which provides the SSH daemon and ssh-keygen utility to generate SSH keys.

              • FreeScale MPC8535
            9/26/2017
            • SSH:
              • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3923
            1424Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Bhadresh Udani
            bhadresh.udani@hpe.com
            +91 9886399320

            Premnath M
            premnath.mangal@hpe.com
            +91 9845369405

            HPE BladeSystem c-Class Virtual Connect Firmware OpenSSL libssl Library 1.0.2.j

            4.65 (Firmware)


            This is a TLS library which depends on the libcrypto library.

              • FreeScale MPC8535
            9/26/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3923, HMAC #3187
            1423Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Hridya Valakkadavil Thilakan
            hridya-valakkadavil.thilakan@hpe.com

            Aprana Shrivastava
            aprana.shrivastava@hpe.com

            HPE BladeSystem c-Class Onboard Administrator Firmware SNMP Library 5.4.4

            4.71 (Firmware)


            The module provides an SNMPv3 interface for remote management of HPE BladeSystem c-Class enclosures and for providing different enclosure state and statistics.

              • PowerPC 440EPx
            9/26/2017
            • SNMP:
            1422Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Hridya Valakkadavil Thilakan
            hridya-valakkadavil.thilakan@hpe.com

            Aprana Shrivastava
            aprana.shrivastava@hpe.com

            HPE BladeSystem c-Class Onboard Administrator Firmware SSH Library 6.2p2

            4.71 (Firmware)


            The module provides CLI access to OA with the SSH protocol. It encrypts all traffic and provides a large suite of secure tunnelling capabilities, several authentication methods, and sophisticated configuration options to provide a secure connection to OA.

              • PowerPC 440EPx
            9/26/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3920
            1421Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Hridya Valakkadavil Thilakan
            hridya-valakkadavil.thilakan@hpe.com

            Aprana Shrivastava
            aprana.shrivastava@hpe.com

            HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libssl Library 1.0.2.h

            4.71 (Firmware)


            This module provides the Transport Layer security ( TLS/SSL Protocols) for administrative control of HPE BladeSystem c-Class enclosures.

              • PowerPC 440EPx
            9/26/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3920, HMAC #3186
            1420FireEye, Inc.
            1440 McCarthy Boulevard
            Milipitas, CA 90655
            USA

            Steve Lanser
            steve.lanser@fireeye.com
            508-983-2505

            FireEye Cryptographic Implementation

            1.0


            The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

              • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
            9/26/2017
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3919
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3919, HMAC #3185
            1419FireEye, Inc.
            1440 McCarthy Boulevard
            Milipitas, CA 90655
            USA

            Steve Lanser
            steve.lanser@fireeye.com
            508-983-2505

            FireEye Cryptographic Implementation

            1.0


            The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

              • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
            9/26/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
              • Prerequisite: SHS #3919, ECDSA #1200, DRBG #1653
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
              • Prerequisite: SHS #3919, DSA #1286, DRBG #1653
            1418Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 6 NSS without AES-NI

            R6-1.0.0


            Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

              • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            9/26/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3918, HMAC #3184
            1417Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 6 NSS without AES-NI

            R6-1.0.0


            Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

              • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            9/26/2017
            • KAS ECC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3918, ECDSA #1199, DRBG #1652
            • KAS FFC:
              • Functions: Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3918, DSA #1285, DRBG #1652
            1416IBM Corporation
            1787 Sentry Pkwy West
            Building 18, Suite 200
            Blue Bell, PA 19422
            USA

            Sandeep Singhal
            Sandeep.Singhal1@ibm.com
            215-664-1614

            OpenSSL for the IBM MaaS360 Cloud Extender

            2.91


            The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

              • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
            9/26/2017
            • KAS ECC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3914, ECDSA #1198, DRBG #1650
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3914, DSA #1326, DRBG #1650
            1415Information Security Corp
            1011 Lake St. Suite 425
            Oak Park, IL 60118
            USA

            Jonathan Schulze-Hewett
            schulze-hewett@infoseccorp.com
            708-445-1704
            Fax: 708-445-9705

            Michael Markowitz
            markowitz@infoseccorp.com
            708-445-1704
            Fax: 708-445-9705

            ISC OpenSSL FIPS Object Module

            1.0


            ISC OpenSSL module based on the OpenSSL FIPS Object Module version 2.0.

              • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
              • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
            9/15/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1414Information Security Corp
            1011 Lake St. Suite 425
            Oak Park, IL 60118
            USA

            Jonathan Schulze-Hewett
            schulze-hewett@infoseccorp.com
            708-445-1704
            Fax: 708-445-9705

            Michael Markowitz
            markowitz@infoseccorp.com
            708-445-1704
            Fax: 708-445-9705

            ISC OpenSSL FIPS Object Module

            1.0


            ISC OpenSSL module based on the OpenSSL FIPS Object Module version 2.0.

              • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
              • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
            9/15/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            1413Cisco Systems, Inc.
            170 West Tasman Drive
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            Cisco Security Crypto Virtual

            F6.0


            FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

              • Intel Xeon E series w/ ESXi 6.0
              • Intel Xeon E series w/ ESXi 5.5
            9/15/2017
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3913
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3913, HMAC #3181
            1412Cisco Systems, Inc.
            170 West Tasman Drive
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            Cisco Security Crypto Virtual

            F6.0


            FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

              • Intel Xeon E series w/ ESXi 6.0
              • Intel Xeon E series w/ ESXi 5.5
            9/15/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3913, ECDSA #1197, DRBG #1649
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3913, DSA #1284, DRBG #1649
            1411Bomgar Corporation
            578 Highland Colony Parkway
            Paragon Centre, Suite 300
            Ridgeland, MS 39157
            USA

            Faye Santangelo
            FSantangelo@bomgar.com
            6016078322

            Bomgar Cryptographic Engine

            2.0.13 (Firmware)


            The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

              • Intel® Xeon E5-2640 v3
            9/15/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1410Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            libreswan (KDF 800-135)

            5.0


            KDF for Intel x86_64 bit for the IKE protocol

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/8/2017
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 256-512
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3884, HMAC #3156
            • IKEv2:
              • Derived Keying Material length: 1056-3072
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3884, HMAC #3156
            1409Lenovo Group Limited
            7001 Development Drive
            Morrisville, NC 27560
            USA

            James Takahashi
            jtakahashi2@lenovo.com
            503-643-8308

            Taylor Greenwood
            tgreenwood@lenovo.com
            515-450-7432

            Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

            1.0


            The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

              • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
            9/8/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3905, SHS #3906, SHS #3907, HMAC #3175
            1408Lenovo Group Limited
            7001 Development Drive
            Morrisville, NC 27560
            USA

            James Takahashi
            jtakahashi2@lenovo.com
            503-643-8308

            Taylor Greenwood
            tgreenwood@lenovo.com
            515-450-7432

            Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

            1.0


            The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

              • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
            9/8/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3907, ECDSA #1194, DRBG #1641
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3907, DSA #1282, DRBG #1641
            1407FireEye, Inc.
            1440 McCarthy Boulevard
            Milipitas, CA 90655
            USA

            Steve Lanser
            steve.lanser@fireeye.com
            508-983-2505

            FireEye SSL

            1.0 (Firmware)


            The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

              • Intel Xeon
              • Intel Xeon with ESXi 6.5
              • Intel Atom
              • AMD Opteron
            9/8/2017
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3904
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3904, HMAC #3172
            1406FireEye, Inc.
            1440 McCarthy Boulevard
            Milipitas, CA 90655
            USA

            Steve Lanser
            steve.lanser@fireeye.com
            508-983-2505

            FireEye SSL

            1.0 (Firmware)


            The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

              • Intel Xeon
              • Intel Xeon with ESXi 6.5
              • Intel Atom
              • AMD Opteron
            9/8/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
              • Prerequisite: SHS #3904, ECDSA #1193, DRBG #1638
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
              • Prerequisite: SHS #3904, DSA #1281, DRBG #1638
            1405VMware, Inc.
            3401 Hillview Ave
            Palo Alto, CA 94303
            USA

            Manoj Maskara
            mmaskara@vmware.com
            650-427-1000
            Fax: 650-475-5001

            Michael McKay
            mmckay@vmware.com
            650-427-3615
            Fax: 650-475-5001

            VMware BC-FJA (Bouncy Castle FIPS Java API)

            1.0.0


            The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

              • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
            9/1/2017
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1404VMware, Inc.
            3401 Hillview Ave
            Palo Alto, CA 94303
            USA

            Manoj Maskara
            mmaskara@vmware.com
            650-427-1000
            Fax: 650-475-5001

            Michael McKay
            mmckay@vmware.com
            650-427-3615
            Fax: 650-475-5001

            VMware BC-FJA (Bouncy Castle FIPS Java API)

            1.0.0


            The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

              • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
            9/1/2017
            • ECDSA SigGen:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1637
            1403VMware, Inc.
            3401 Hillview Ave
            Palo Alto, CA 94303
            USA

            Manoj Maskara
            mmaskara@vmware.com
            650-427-1000
            Fax: 650-475-5001

            Michael McKay
            mmckay@vmware.com
            650-427-3615
            Fax: 650-475-5001

            VMware BC-FJA (Bouncy Castle FIPS Java API)

            1.0.0


            The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

              • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
            9/1/2017
            • ANS 9.63:
              • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3902
            • IKEv2:
              • Derived Keying Material length: 1056-3072
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3902, HMAC #3171
            • SRTP:
              • AES Key Lengths: 128, 192, 256 (bits)
              • Prerequisite: AES #4760
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3902
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3902, HMAC #3171
            1402Legion of the Bouncy Castle Inc.
            85 The Crescent
            Ascot Vale, Victoria 3032
            Australia

            David Hook
            dgh@bouncycastle.org
            +61438170390

            Jon Eaves
            jon@bouncycastle.org
            +61417502969

            Bouncy Castle FIPS Java API

            1.0.1


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            9/1/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1401Legion of the Bouncy Castle Inc.
            85 The Crescent
            Ascot Vale, Victoria 3032
            Australia

            David Hook
            dgh@bouncycastle.org
            +61438170390

            Jon Eaves
            jon@bouncycastle.org
            +61417502969

            Bouncy Castle FIPS Java API

            1.0.1


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            9/1/2017
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1400Legion of the Bouncy Castle Inc.
            85 The Crescent
            Ascot Vale, Victoria 3032
            Australia

            David Hook
            dgh@bouncycastle.org
            +61438170390

            Jon Eaves
            jon@bouncycastle.org
            +61417502969

            Bouncy Castle FIPS Java API

            1.0.1


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            9/1/2017
            • ECDSA SigGen:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1636
            1399Legion of the Bouncy Castle Inc.
            85 The Crescent
            Ascot Vale, Victoria 3032
            Australia

            David Hook
            dgh@bouncycastle.org
            +61438170390

            Jon Eaves
            jon@bouncycastle.org
            +61417502969

            Bouncy Castle FIPS Java API

            1.0.1


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            9/1/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1398Legion of the Bouncy Castle Inc.
            85 The Crescent
            Ascot Vale, Victoria 3032
            Australia

            David Hook
            dgh@bouncycastle.org
            +61438170390

            Jon Eaves
            jon@bouncycastle.org
            +61417502969

            Bouncy Castle FIPS Java API

            1.0.1


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
              • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            9/1/2017
            • ANS 9.63:
              • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3901
            • IKEv2:
              • Derived Keying Material length: 160-8192
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 384 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3901, HMAC #3170
            • SRTP:
              • AES Key Lengths: 128, 192, 256 (bits)
              • Prerequisite: AES #4759
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3901
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3901, HMAC #3170
            1397IBM Corporation
            2455 South Road
            Poughkeepsie, New York 12601-5400
            USA

            John Monti
            jmonti@us.ibm.com
            845-435-4164

            IBM z/OS(R) Cryptographic Services System SSL - 64bit

            OA52653


            z/OS(TM) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

              • z13 w/ IBM z/OS(R) v2.2
            9/1/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3900, HMAC #3169
            1396IBM Corporation
            2455 South Road
            Poughkeepsie, New York 12601-5400
            USA

            John Monti
            jmonti@us.ibm.com
            845-435-4164

            IBM z/OS(R) Cryptographic Services System SSL - 31bit

            OA52653


            z/OS(TM) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

              • z13 w/ IBM z/OS(R) v2.2
            9/1/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #3899, HMAC #3168
            1395Yubico
            420 Florence St, Ste 200
            Palo Alto, CA 94301
            USA

            Jerrod Chong
            jerrod@yubico.com

            Jakob Ehrensvard
            jakob@yubico.com

            Yubico HW/FW RSA

            SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


            This module contains two parts: 1) RSA core HW/FW implementation using Infineon CL70 crypto library; 2) High-level FW implementation for key generation, encryption and decryption primitives

              • Infineon SLE78V2
            9/1/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1394Software Diversified Services
            1322 81st Ave NE
            Minneapolis, MN 55432
            USA

            Tim Full
            cavp@sdsusa.com

            SDS Cryptographic Module

            1.0


            Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

              • Intel i7 w/ Windows Server 2012 R2
              • Intel i7 w/ Windows Server 2016
              • Intel i7 w/ RedHat 6.9
              • Intel i7 w/ RedHat 7.4
              • POWER8 w/ AIX 6.1
              • POWER8 w/ AIX 7.2
            9/1/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1393Software Diversified Services
            1322 81st Ave NE
            Minneapolis, MN 55432
            USA

            Tim Full
            cavp@sdsusa.com

            SDS Cryptographic Module

            1.0


            Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

              • Intel i7 with AES-NI w/ Windows Server 2012 R2
              • Intel i7 with AES-NI w/ Windows Server 2016
              • Intel i7 with AES-NI w/ RedHat 6.9
              • Intel i7 with AES-NI w/ RedHat 7.4
              • POWER8 w/ AIX 6.1
              • POWER8 w/ AIX 7.2
            9/1/2017
            • KAS ECC:
              • Functions: Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-224
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3898, ECDSA #1190, DRBG #1635
            1392Gemalto
            20 Colonnade Road, Suite 200
            Ottawa, ON K2E7M6
            Canada

            Security and Certifications Team
            SecurityCertifications@gemalto.com

            Luna K7 Accelerated Cryptographic Library

            7.0.1 (Firmware)


            The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

              • PowerPC 476
            9/1/2017
            • ECDSA SigGen:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1634
            1391Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-OpenSSH-vSRX

            15.1X49-D100


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
            9/1/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #3865
            1390Alcatel-Lucent Enterprise
            26801 West Agoura Road
            Calabasas, CA 93021
            USA

            Eric Tolliver
            eric.tolliver@al-enterprise.com
            818-878-4623

            Vadivel Poonathan
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Alcatel-Lucent Enterprise AOS OmniSwitch OS6450

            AOS 6.7.1.R04


            ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

              • Integrated ARMv5 core w/ AOS 6.7.1.R04
            9/1/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #3522
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3522, HMAC #2820
            1389Alcatel-Lucent Enterprise
            26801 West Agoura Road
            Calabasas, CA 93021
            USA

            Eric Tolliver
            eric.tolliver@al-enterprise.com
            818-878-4623

            Vadivel Poonathan
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Alcatel-Lucent Enterprise AOS OmniSwitch OS6350

            AOS 6.7.1.R04


            ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

              • Integrated ARMv7 core w/ AOS 6.7.1.R04
            9/1/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #3575
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #3575, HMAC #2879
            1388Monkton, Inc
            2236 Central Ave
            Tysons, VA 22182
            USA

            Harold E. Smith III
            harold@monkton.io
            571-527-6680

            OpenSSL

            1.0.2L


            Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton''s Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

              • Apple A10X w/ iOS 10.3.2
              • Apple A10 Fusion w/ iOS 10.3.2
            8/25/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3894, ECDSA #1186, DRBG #1632
            1387SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            Ray Potter
            ray@safelogic.com
            650-646-1702

            CryptoComply Server Engine

            2.1


            CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

              • Intel x86_64 w/ CentOS 7.3
            8/25/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1386ARM Ltd
            110 Fulbourn Road
            Cambridge CB1 9NJ
            United Kingdom

            Leo Dorrendorf
            leo.dorrendorf@arm.com
            +972-52-6818594
            Fax: +972-73-2558808

            Udi Maor
            udi.maor@arm.com
            +972-54-4205101
            Fax: +972-73-2558808

            ARM TrustZone Cryptocell 712 TEE

            CC 712 TEE sw-cc715tee-1.1.0.48 (Firmware)


            ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

              • ARM TrustZone-Enabled Series A CPU
            8/25/2017
            • ANS 9.63:
              • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3892
            1385ARM Ltd
            110 Fulbourn Road
            Cambridge CB1 9NJ
            United Kingdom

            Leo Dorrendorf
            leo.dorrendorf@arm.com
            +972-52-6818594
            Fax: +972-73-2558808

            Udi Maor
            udi.maor@arm.com
            +972-54-4205101
            Fax: +972-73-2558808

            ARM TrustZone Cryptocell 712 TEE

            CC 712 TEE


            ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

              8/25/2017
              • ECC CDH:
                • Curves: P-224, P-256, P-384, P-521
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • dhHybrid1:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                  • dhHybrid1Flow:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                  • dhOneFlow:
                    • Key Agreement Roles: Initiator, Responder
                  • dhStatic:
                    • Key Agreement Roles: Initiator, Responder
                • Prerequisite: SHS #3892, DRBG #1630
              1385ARM Ltd
              110 Fulbourn Road
              Cambridge CB1 9NJ
              United Kingdom

              Leo Dorrendorf
              leo.dorrendorf@arm.com
              +972-52-6818594
              Fax: +972-73-2558808

              Udi Maor
              udi.maor@arm.com
              +972-54-4205101
              Fax: +972-73-2558808

              ARM TrustZone Cryptocell 712 TEE

              CC 712 TEE


              ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • dhHybrid1:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • dhHybrid1Flow:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • dhOneFlow:
                      • Key Agreement Roles: Initiator, Responder
                    • dhStatic:
                      • Key Agreement Roles: Initiator, Responder
                  • Prerequisite: SHS #3892, DRBG #1630
                1384Ixia
                26601 W. Agoura Road
                Calabasas, California 91302
                USA

                Tom Casella
                NVSCertificationTeam@ixiacom.com
                703-288-0184

                NTO SNMP Library

                1.9.3c_4.5 (Firmware)


                The NTO SNMP Library contains the key derivation function (KDF) for SNMPv3 privacy and authentication protocols.

                  • Intel i7 3555LE
                8/25/2017
                • SNMP:
                1383Ixia
                26601 W. Agoura Road
                Calabasas, California 91302
                USA

                Tom Casella
                NVSCertificationTeam@ixiacom.com
                703-288-0184

                NTO Crypto Library

                1.0.1-1 (Firmware)


                The NTO Crypto Library performs all cryptographic functionality for the NTO 7303 and Vision ONE appliances, including asymmetric key generation, symmetric encryption, hashing, digital signatures, and provides TLSv1.2 protocols and SNMPv3 privacy and authentication protocols.

                  • Intel i7 3555LE
                8/25/2017
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #3891, HMAC #3162
                1382Nuvoton Technology Corporation
                No. 4, Creation Rd. III
                Hsinchu Science Park 300
                Taiwan, R.O.C.

                Yossi Talmi
                yossi.talmi@nuvoton.com
                +972-9-9702364
                Fax: +972-9-9702001

                Oren Tanami
                oren.tanami@nuvoton.com
                +972-9-9702390
                Fax: +972-9-9702001

                Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

                LAG019


                Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 0, revision 1.38

                  • N/A
                8/25/2017
                1381Nuvoton Technology Corporation
                No. 4, Creation Rd. III
                Hsinchu Science Park 300
                Taiwan, R.O.C.

                Yossi Talmi
                yossi.talmi@nuvoton.com
                +972-9-9702364
                Fax: +972-9-9702001

                Oren Tanami
                oren.tanami@nuvoton.com
                +972-9-9702390
                Fax: +972-9-9702001

                Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

                LAG019


                Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 0, revision 1.38

                  • N/A
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                1380Sonus Networks, Inc.
                4 Technology Park Drive
                Westford, MAS 01886
                USA

                Keith Conger
                kconger@sonusnet.com
                978-614-8115

                Adam Elshama
                aelshama@sonusnet.com
                978-614-8327

                Sonus SBC Software Edition Session Border Controller

                5.1.2


                Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

                  • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
                8/25/2017
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128, 192 (bits)
                  • Prerequisite: AES #4686
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3836
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3836, HMAC #3101
                1379Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                Red Hat NSS Softoken (64 bit)

                5.0


                User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

                  • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
                8/25/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3885, HMAC #3157
                1378Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                Red Hat NSS Softoken (32 bit)

                5.0


                User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

                  • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
                8/25/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3884, HMAC #3156
                1377IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core without PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1178
                1376IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core without PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • SPARC T4 w/ Solaris(R) 11 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1180
                1375IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • SPARC T4 w/ Solaris(R) 11 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1179
                1374IBM Corporation
                1 New Orchard Road
                Armonk, NY 10504
                USA

                Peter Szczepankiewicz
                peter.s14@us.ibm.com
                757-689-0507
                Fax: 757-689-0507

                Rory Bray
                rory.bray@ca.ibm.com
                506-449-7810
                Fax: 506-449-7810

                libcrypto/openssl

                1.0.1e


                Main crypto provider for all standard QRadar functionality

                  • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
                8/25/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-512
                  • Prerequisite: SHS #3880
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #3880, HMAC #3167
                1373IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1177
                1372IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core without PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1176
                1371IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1175
                1370IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core without PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1174
                1369IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
                8/25/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1173
                1368IBM Corporation
                1 New Orchard Road
                Armonk, NY 10504
                USA

                Peter Szczepankiewicz
                peter.s14@us.ibm.com
                757-689-0507
                Fax: 757-689-0507

                Rory Bray
                rory.bray@ca.ibm.com
                506-449-7810
                Fax: 506-449-7810

                libcrypto/openssl

                1.0.1e


                Main crypto provider for all standard QRadar functionality

                  • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
                8/25/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3880, DSA #1267, DRBG #1621
                1367IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
                8/18/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1172
                1366IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
                8/18/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1171
                1365IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
                8/18/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1170
                1364IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
                8/18/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1169
                1363IBM(R) Corporation
                Seabank Centre
                12 - 14 Marine Parade
                Southport, QLD 4215
                Australia

                Peter Waltenberg
                pwalten@au1.ibm.com
                +61 7 5552 4016
                Fax: +61 7 5571 0420

                ICC Algorithmic Core with PAAs

                8.6.0.0


                ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

                  • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
                8/18/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Prerequisite: ECDSA #1168
                1362Juniper Networks, Inc.
                1133 Innovation Way
                Sunnyvale, CA 94089
                USA

                Pradeepa M R
                pradeepam@juniper.net

                Vann (Vanna) Nguyen
                vann@juniper.net
                408-745-2000

                JUNOS FIPS Version 15.1X49-D100- Quicksec

                15.1X49-D100


                The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

                  • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
                8/18/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key
                  • Pre-shared Key Length: 8-256
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3864, HMAC #3136
                • IKEv2:
                  • Derived Keying Material length: 1136-2432
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3864, HMAC #3136
                1361Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSH Server/Client

                5.0


                SP 800-135 KDF for Intel x86_64 bit

                  • Intel(R) Xeon(R) CPU E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
                8/18/2017
                1360Yubico
                420 Florence St, Ste 200
                Palo Alto, CA 94301
                USA

                Jerrod Chong
                jerrod@yubico.com

                Jakob Ehrensvard
                jakob@yubico.com

                Yubico HW/FW ECC

                SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


                This module contains three parts: 1) ECC core hardware/firmware implementation via Infineon CL70 crypto library; 2) High-level firmware implementation for key generation and ECDSA signature generation; 3) ECC curve domain parameters

                  • Infineon SLE78V2
                8/18/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                  • Prerequisite: DRBG #1604
                1359SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

                3.0


                This test covers assembler implementation of AES, SHA and GHASH.

                  • z13 w/ SUSE Linux Enterprise Server 12 SP2
                8/18/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3788, HMAC #3059
                1358Yubico
                420 Florence St, Ste 200
                Palo Alto, CA 94301
                USA

                Jerrod Chong
                jerrod@yubico.com

                Jakob Ehrensvard
                jakob@yubico.com

                Yubico HW/FW RSA

                SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


                This module contains two parts: 1) RSA core HW/FW implementation using Infineon CL70 crypto library; 2) High-level FW implementation for key generation, encryption and decryption primitives

                  • Infineon SLE78V2
                8/18/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1357Ultra Electronics 3eTI
                9715 Key West Avenue
                Suite 500
                Rockville, MD 20850
                USA

                Harinder Sood
                harinder.sood@ultra-3eti.com
                301-944-1325
                Fax: 301-670-6779

                Chris Guo
                chris.guo@ultra-3eti.com
                301-944-1294
                Fax: 301-670-6779

                3eTI OpenSSL Algorithm Implementation

                2.0 (Firmware)


                Algorithms listed are used to provide encryption and authentication services within 3eTI networking products.

                  • MPC8378E
                8/11/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #1801, ECDSA #415, DRBG #822
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #1801, DSA #1255, DRBG #822
                1356Yubico
                420 Florence St, Ste 200
                Palo Alto, CA 94301
                USA

                Jerrod Chong
                jerrod@yubico.com

                Jakob Ehrensvard
                jakob@yubico.com

                Yubico HW/FW ECC

                SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


                This module contains three parts: 1) ECC core hardware/firmware implementation via Infineon CL70 crypto library; 2) High-level firmware implementation for key generation and ECDSA signature generation; 3) ECC curve domain parameters

                  • Infineon SLE78V2
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384, P-521
                1355Juniper Networks, Inc.
                1133 Innovation Way
                Sunnyvale, CA 94089
                USA

                Pradeepa M R
                pradeepam@juniper.net

                Vann (Vanna) Nguyen
                vann@juniper.net
                408-745-2000

                JUNOS FIPS Version 15.1X49-D100-QuickSec

                15.1X49-D100 (Firmware)


                The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

                  • Intel Xeon E5
                8/11/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key
                  • Pre-shared Key Length: 64-2048
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3857, HMAC #3129
                • IKEv2:
                  • Derived Keying Material length: 1136-2432
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3857, HMAC #3129
                1354ST Microelectronics (Protonworld)
                Green Square Building B, Lambroekstraat 5
                Diegem/Machelen B-1831
                Belgium

                Olivier COLLART
                olivier.collart@st.com
                +32 272 450 77
                Fax: +32 272 451 43

                Fabien ARRIVE
                fabien.arrive@st.com
                +33 223 470 633
                Fax: +33 223 470 400

                ST33TPHF2ESPI

                ST33HTPH2E28AHB4


                ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

                  • N/A
                8/11/2017
                1353ST Microelectronics (Protonworld)
                Green Square Building B, Lambroekstraat 5
                Diegem/Machelen B-1831
                Belgium

                Olivier COLLART
                olivier.collart@st.com
                +32 272 450 77
                Fax: +32 272 451 43

                Fabien ARRIVE
                fabien.arrive@st.com
                +33 223 470 633
                Fax: +33 223 470 400

                ST33TPHF2EI2C

                ST33HTPH2E28AHB8


                ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

                  • N/A
                8/11/2017
                1352Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A10 w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3428, DSA #1252, DRBG #1283
                1351Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A9X w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3425, DSA #1251, DRBG #1280
                1350Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A9 w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3426, DSA #1250, DRBG #1281
                1349Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A8X w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3423, DSA #1249, DRBG #1278
                1348Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A8 w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3422, DSA #1248, DRBG #1277
                1347Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669) 227-3579

                Apple iOS CoreCrypto Module (Generic)

                7.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                  • Apple A7 w/ iOS 10
                8/11/2017
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3421, DSA #1247, DRBG #1276
                1346Trend Micro Inc.
                11305 Alterra Parkway
                Austin, TX 78758
                USA

                Paul Tucker
                paul_tucker@trendmicro.com
                512-633-7945

                TippingPoint Crypto Core OpenSSL

                2.0.13


                The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

                  • Intel Core i3 without PAA w/ Linux 4.4
                  • Intel Xeon with PAA w/ Linux 4.4
                  • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1345SafeLogic, Inc.
                530 Lytton Ave
                Suite 200
                Palo Alto, CA 94301
                USA

                SafeLogic Inside Sales
                sales@safelogic.com
                (844) 436-2797

                CryptoComply Java Engine

                3.0.1


                CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

                  • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
                8/11/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1344SafeLogic, Inc.
                530 Lytton Ave
                Suite 200
                Palo Alto, CA 94301
                USA

                SafeLogic Inside Sales
                sales@safelogic.com
                (844) 436-2797

                CryptoComply Java Engine

                3.0.1


                CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

                  • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1343SafeLogic, Inc.
                530 Lytton Ave
                Suite 200
                Palo Alto, CA 94301
                USA

                SafeLogic Inside Sales
                sales@safelogic.com
                (844) 436-2797

                CryptoComply Java Engine

                3.0.1


                CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

                  • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
                8/11/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1600
                1342SafeLogic, Inc.
                530 Lytton Ave
                Suite 200
                Palo Alto, CA 94301
                USA

                SafeLogic Inside Sales
                sales@safelogic.com
                (844) 436-2797

                CryptoComply Java Engine

                3.0.1


                CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

                  • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
                8/11/2017
                • ANS 9.63:
                  • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3849
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 (bits)
                      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 8192 (bits)
                      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3849, HMAC #3114
                • SRTP:
                  • AES Key Lengths: 128, 192, 256 (bits)
                  • Prerequisite: AES #4702
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3849
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3849, HMAC #3114
                1341Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Linda Gallops
                linda.gallops@oracle.com
                +1 704.972.5018
                Fax: +1 980.355.5399

                Chris Brych
                chris.brych@oracle.com
                +1 613.216.3078

                Oracle Linux 7 Libreswan

                R7-2.0.0


                Oracle Linux 7 Libreswan Cryptographic Module is a framework for providing cryptographic services to other network entities implementing the IKEv1 and IKEv2 protocols.

                  • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
                8/11/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key
                  • Pre-shared Key Length: 256-512
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 8192 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3808, HMAC #3077
                • IKEv2:
                  • Derived Keying Material length: 1056-3072
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 8192 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3808, HMAC #3077
                1340Allwinner Technology Co.,Ltd
                No.9 Technology Road 2, High-Tech Zone
                Zhuhai, Guangdong 519085
                China

                Qing Zhang
                qingzhang@allwinnertech.com
                +86-756-3818333
                Fax: +86-756-3818358

                Wei Guo
                guowei@allwinnertech.com
                +86-756-3818333
                Fax: +86-756-3818358

                Crypto Engine

                V2.0


                Crypto engine is implemented with Veilog HDL. It provides cryptographic functions.

                  • N/A
                8/11/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1339Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/11/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3845, HMAC #3110
                1338Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/11/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3844, HMAC #3109
                1337LG Electronics, Inc.
                20 Yoido-dong
                Youngdungpo-gu
                Seoul 152-721
                Republic of Korea

                Jongseong Kim
                jongseong.kim@lge.com
                82-10-4535-0110
                Fax: 82-2-6950-2080

                LG BoringSSL

                2.0


                General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

                  • Snapdragon 835 (MSM8998) w/ Android 7.1.2
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3841, ECDSA #1159, DRBG #1592
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3841, DSA #1243, DRBG #1592
                1336NetBrain Technologies, Inc
                15 Network Drive 2nd Floor
                Burlington, Massachusetts 01803
                United States

                Michael Passanisi
                Michael.Passanisi@netbraintech.com
                781-221-7199 (x2055)
                Fax: +1 (781) 998-5800

                Boyang Zhang
                boyang.zhang@netbraintech.com
                781-221-7199 (x2059)

                NetBrain OpenSSL Cryptographic Module

                1.0


                The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

                  • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
                8/11/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3840, HMAC #3105
                1335NetBrain Technologies, Inc
                15 Network Drive 2nd Floor
                Burlington, Massachusetts 01803
                United States

                Michael Passanisi
                Michael.Passanisi@netbraintech.com
                781-221-7199 (x2055)
                Fax: +1 (781) 998-5800

                Boyang Zhang
                boyang.zhang@netbraintech.com
                781-221-7199 (x2059)

                NetBrain OpenSSL Cryptographic Module

                1.0


                The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

                  • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
                8/11/2017
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3840, ECDSA #1158, DRBG #1591
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3840, DSA #1242, DRBG #1591
                1334Taisys Technologies Co. Ltd.
                7F., No.56, Lane 321
                Yangguang St., Neihu Dist.
                Taipei, Taipei 11491
                Taiwan (R.O.C.)

                Joe Wang
                joe.wang@taisys.com
                +886-2-26270927x6699
                Fax: +886-2-26270619

                Kent Horng
                kent.horng@taisys.com
                +886-2-26562185 #206
                Fax: +886-2-26579657

                TAISYS JUISE-S2

                ST33G1M2


                The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

                  • N/A
                8/11/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1333Taisys Technologies Co. Ltd.
                7F., No.56, Lane 321
                Yangguang St., Neihu Dist.
                Taipei, Taipei 11491
                Taiwan (R.O.C.)

                Joe Wang
                joe.wang@taisys.com
                +886-2-26270927x6699
                Fax: +886-2-26270619

                Kent Horng
                kent.horng@taisys.com
                +886-2-26562185 #206
                Fax: +886-2-26579657

                TAISYS JUISE-S2

                ST33G1M2


                The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

                  • N/A
                8/11/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1332Taisys Technologies Co. Ltd.
                7F., No.56, Lane 321
                Yangguang St., Neihu Dist.
                Taipei, Taipei 11491
                Taiwan (R.O.C.)

                Joe Wang
                joe.wang@taisys.com
                +886-2-26270927x6699
                Fax: +886-2-26270619

                Kent Horng
                kent.horng@taisys.com
                +886-2-26562185 #206
                Fax: +886-2-26579657

                TAISYS JUISE-S2

                ST33G1M2


                The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

                  • N/A
                8/11/2017
                • ECDSA SigGen:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1590
                1331Taisys Technologies Co. Ltd.
                7F., No.56, Lane 321
                Yangguang St., Neihu Dist.
                Taipei, Taipei 11491
                Taiwan (R.O.C.)

                Joe Wang
                joe.wang@taisys.com
                +886-2-26270927x6699
                Fax: +886-2-26270619

                Kent Horng
                kent.horng@taisys.com
                +886-2-26562185 #206
                Fax: +886-2-26579657

                TAISYS JUISE-S2

                ST33G1M2


                The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

                  • N/A
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                1330Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x7416
                Fax: 613-225-9951

                Fortinet FortiWeb SSL Cryptographic Library

                5.6 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiWeb SSL Cryptographic Library v5.6 running on Intel x86 compatible processors.

                  • Intel Xeon E5 v3
                8/11/2017
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3673, DRBG #1434
                1329Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS FIPS Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3 Series
                  • Intel i5 Series
                  • Intel i7 Series
                8/11/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1543
                1328BiObex, LLC
                11501 Sunset Hills Rd
                Suite 200
                Reston, VA 22190
                USA

                Arthur Joyce
                ajoyce@biobex.com
                571-313-0969

                SAFE-Key device

                1.1.0.0 (Firmware)


                The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

                  • STM32F415
                8/11/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1327Sonus Networks, Inc.
                4 Technology Park Drive
                Westford, MAS 01886
                USA

                Keith Conger
                kconger@sonusnet.comkconger@sonusnet.com
                978-614-8115

                Adam Elshama
                aelshama@sonusnet.com
                978-614-8327

                Sonus Cryptographic Library version 3.0

                5.1.2


                Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

                  • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
                8/11/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1326Cisco Systems, Inc
                170 W Tasman Dr
                San Jose, CA 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon on VMware ESXi 5.5
                8/4/2017
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1
                  • Prerequisite: SHS #3831, HMAC #3096
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128, 192, 256 (bits)
                  • Prerequisite: AES #4680
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3831
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3831, HMAC #3096
                1325Cisco Systems, Inc
                170 W Tasman Dr
                San Jose, CA 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon on VMware ESXi 5.5
                8/4/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-512
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-512
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3831, ECDSA #1155, DRBG #1583
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3831, DSA #1241, DRBG #1583
                1324Cisco Systems, Inc
                170 W Tasman Dr
                San Jose, CA 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon
                8/4/2017
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1
                  • Prerequisite: SHS #3830, HMAC #3095
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128, 192, 256 (bits)
                  • Prerequisite: AES #4676
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3830
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3830, HMAC #3095
                1323Cisco Systems, Inc
                170 W Tasman Dr
                San Jose, CA 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon
                8/4/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-512
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-512
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3830, ECDSA #1154, DRBG #1581
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                  • Prerequisite: SHS #3830, DSA #1240, DRBG #1581
                1322IBM Corporation
                2455 South Road
                Poughkeepsie, New York 12601-5400
                USA

                John Monti
                jmonti@us.ibm.com
                845-435-4164

                IBM z/OS(R) Cryptographic Services ICSF PKCS #11 with CEX5A

                OA52336


                ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

                  • IBM z13 w/ IBM z/OS(R) v2.2
                8/4/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                    • One Pass DH:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                    • Static Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3761, ECDSA #1123, DRBG #1530
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • dhOneFlow:
                      • Key Agreement Roles: Initiator, Responder
                    • dhStatic:
                      • Key Agreement Roles: Initiator, Responder
                  • Prerequisite: SHS #3761, DSA #1216, DRBG #1530
                1321Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2, x86_64, 32-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3824, HMAC #3091
                1320Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2, x86_64, 32-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3824, ECDSA #1151, DRBG #1579
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3824, DSA #1238, DRBG #1579
                1319Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2, x86_64, 64-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3823, HMAC #3090
                1318Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (no AVX2, x86_64, 64-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3823, ECDSA #1150, DRBG #1578
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3823, DSA #1237, DRBG #1578
                1317RSA, The Security Division of EMC
                174 Middlesex Turnpike
                Bedford, MA 01730
                USA

                Rohit Mathur
                rohit.mathur@rsa.com
                +61730325220

                RSA BSAFE Crypto-C Micro Edition

                4.1.3.2


                RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                  • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
                8/4/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1577
                1316RSA, The Security Division of EMC
                174 Middlesex Turnpike
                Bedford, MA 01730
                USA

                Rohit Mathur
                rohit.mathur@rsa.com
                +61730325220

                RSA BSAFE Crypto-C Micro Edition

                4.1.3.2


                RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                  • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
                8/4/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1315RSA, The Security Division of EMC
                174 Middlesex Turnpike
                Bedford, MA 01730
                USA

                Rohit Mathur
                rohit.mathur@rsa.com
                +61730325220

                RSA BSAFE Crypto-C Micro Edition

                4.1.3.2


                RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                  • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
                8/4/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1314RSA, The Security Division of EMC
                174 Middlesex Turnpike
                Bedford, MA 01730
                USA

                Rohit Mathur
                rohit.mathur@rsa.com
                +61730325220

                RSA BSAFE Crypto-C Micro Edition

                4.1.3.2


                RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                  • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
                8/4/2017
                • ANS 9.63:
                  • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3822
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3822, HMAC #3089
                1313Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (Full CPU set, x86_64, 32-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3821, HMAC #3088
                1312Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (Full CPU set, x86_64, 32-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3821, ECDSA #1148, DRBG #1576
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3821, DSA #1235, DRBG #1576
                1311RSA, The Security Division of EMC
                174 Middlesex Turnpike
                Bedford, MA 01730
                USA

                Rohit Mathur
                rohit.mathur@rsa.com
                +61730325220

                RSA BSAFE Crypto-C Micro Edition

                4.1.3.2


                RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                  • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
                8/4/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1310Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                GnuTLS_x86_64_C

                5.0


                GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

                  • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3818, HMAC #3087
                1309Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                GnuTLS_x86_64_C

                5.0


                GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

                  • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3818, ECDSA #1147, DRBG #1575
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3818, DSA #1234, DRBG #1575
                1308Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                GnuTLS_x86_C

                5.0


                GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

                  • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3817, HMAC #3086
                1307Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                GnuTLS_x86_C

                5.0


                GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

                  • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3817, ECDSA #1146, DRBG #1574
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3817, DSA #1233, DRBG #1574
                1306Nokia
                600 March Rd
                Ottawa, Ontario K2K 2E6
                Canada

                Hooman Bidgoli
                hooman.bidgoli@nokia.com
                +1 613 784 5351

                Peter Merriman
                peter.merriman@nokia.com
                +1 613 784 3045

                Nokia 7705 SAR OS Non Datapath Cryptographic Library

                2 (Firmware)


                The Nokia 7705 SAR OS Non Datapath Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

                  • Cavium Octeon Plus
                8/4/2017
                • SSH:
                  • SHA Functions: SHA-1
                  • Prerequisite: SHS #3816
                1305Nokia
                600 March Rd
                Ottawa, Ontario K2K 2E6
                Canada

                Hooman Bidgoli
                hooman.bidgoli@nokia.com
                +1 613 784 5351

                Peter Merriman
                peter.merriman@nokia.com
                +1 613 784 3045

                Nokia 7705 SAR OS Cryptographic Library

                2 (Firmware)


                The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

                  • Cavium Octeon Plus
                8/4/2017
                • IKEv1:
                  • Methods: Pre-shared Key
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 3072 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3815, HMAC #3084
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 3072 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3815, HMAC #3084
                • SSH:
                  • SHA Functions: SHA-1
                  • Prerequisite: SHS #3815
                1304Nokia
                600 March Rd.
                Ottawa, Ontario k0A 2Z0
                Canada

                Hooman Bidgoli
                hooman.bidgoli@nokia.com
                +1 613 784 5351

                Peter Merriman
                peter.merriman@nokia.com
                +1 613 784 3045

                Nokia 7705 SAR OS Cryptographic Library

                2 (Firmware)


                The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

                  • Cavium Octeon II
                8/4/2017
                • IKEv1:
                  • Methods: Pre-shared Key
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 3072 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3814, HMAC #3083
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 3072 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3814, HMAC #3083
                • SSH:
                  • SHA Functions: SHA-1
                  • Prerequisite: SHS #3814
                1302HID Global
                6623 Dumbarton Circle
                Fremont, CA 94555
                USA

                Jean-Luc Azou
                jlazou@hidglobal.com
                510-574-1738
                Fax: 510-574-0100

                Béatrice SALAUN
                bsalaun@hidglobal.com
                + 33 1 42 04 84 56

                RSASP1_OT

                Part # 0F Version 07888.8 with 07846.9 (Firmware) (Firmware)


                The RSA signature primitive provided by the Cosmo V8 platform via Javacard API.

                  • Oberthur Cosmo V8
                8/4/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1301Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Linda Gallops
                linda.gallops@oracle.com
                +1 704.972.5018
                Fax: +1 980.355.5399

                Chris Brych
                chris.brych@oracle.com
                +1 613.216.3078

                Oracle Linux 7 NSS without AES-NI

                R7-2.0.0


                Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

                  • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                1300Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Linda Gallops
                linda.gallops@oracle.com
                +1 704.972.5018
                Fax: +1 980.355.5399

                Chris Brych
                chris.brych@oracle.com
                +1 613.216.3078

                Oracle Linux 7 NSS without AES-NI

                R7-2.0.0


                Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

                  • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
                8/4/2017
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3808, ECDSA #1145, DRBG #1568
                • KAS FFC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3808, DSA #1229, DRBG #1568
                1299Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (Full CPU set, x86_64, 64-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3807, HMAC #3076
                1298Red Hat, Inc.
                100 E. Davie Street
                Raleigh, NC 27601
                USA

                Jaroslav Reznik
                jreznik@redhat.com

                OpenSSL (Full CPU set, x86_64, 64-bit library)

                5.0


                The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                  • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
                8/4/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Full Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3807, ECDSA #1144, DRBG #1567
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3807, DSA #1228, DRBG #1567
                1297DocuSign, Inc.
                221 Main St.
                Suite 1000
                San Francisco, CA 94105
                USA

                Ezer Farhi
                Ezer.Farhi@docusign.com
                +972-39279529
                Fax: +972-39230864

                Moshe Harel
                Moshe.Harel@docusign.com
                +972-39279578
                Fax: +972-39230864

                PrivateServer-OpenSSL

                5.0.2 (Firmware)


                PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

                  • Intel Xeon Quad-Core
                8/4/2017
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #3805, HMAC #3074
                1296DocuSign, Inc.
                221 Main St.
                Suite 1000
                San Francisco, CA 94105
                USA

                Ezer Farhi
                ezer@arx.com
                972-39279529
                Fax: 972-39230864

                Moshe Harel
                Moshe.Harel@docusign.com
                972-3-9279578
                Fax: 972-3-9230864

                PrivateServer

                5.0.2 (Firmware)


                PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

                  • Intel Xeon Quad-Core
                8/4/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1565
                1295Trusted Concepts
                205 Van Buren St
                Suite 440
                Herndon, VA 20170
                USA

                Chris Greenlee
                chris.greenlee@trustedconcepts.com
                202.680.3718

                TrustedKeep Encryption Module

                1.8.3


                TrustedKeep is a secure object storage and sharing solution.

                  • Intel Core i7 w/PAA w/ CentOS 7.3
                  • Intel Core i7 w/o PAA w/ CentOS 7.3
                8/4/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
                  • Prerequisite: ECDSA #1142
                1294Security First Corp.
                29811 Santa Margarita Parkway
                Suite 600
                Rancho Santa Margarita, CA 92688
                USA

                Rick Orsini
                rorsini@securityfirst.com
                949-585-7525
                Fax: 949-858-7092

                Secure Parser Library

                4.7.1.10


                The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library

                  • Intel Atom x5 on GETAC MX50 w/ Android 5.1.1
                8/4/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1293Juniper Networks, Inc.
                1133 Innovation Way
                Sunnyvale, CA 94089
                USA

                Pradeepa M R
                pradeepam@juniper.net

                Vann (Vanna) Nguyen
                vann@juniper.net
                408-745-2000

                JUNOS FIPS Version 15.1X49-D100-OpenSSH

                15.1X49-D100 (Firmware)


                The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

                  • Intel Xeon E5
                8/4/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3795, SHS #3797
                1292Juniper Networks, Inc.
                1133 Innovation Way
                Sunnyvale, CA 94089
                USA

                Pradeepa M R
                pradeepam@juniper.net

                Vann (Vanna) Nguyen
                vann@juniper.net
                408-745-2000

                JUNOS FIPS Version 15.1X49-D100-OpenSSH

                15.1X49-D100 (Firmware)


                The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

                  • Intel Xeon E3
                8/4/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384
                  • Prerequisite: SHS #3796, SHS #3856
                1291Juniper Networks, Inc.
                1133 Innovation Way
                Sunnyvale, CA 94089
                USA

                Pradeepa M R
                pradeepam@juniper.net

                Vann (Vanna) Nguyen
                vann@juniper.net
                408-745-2000

                JUNOS FIPS Version 15.1X49-D100-QuickSec

                15.1X49-D100 (Firmware)


                The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

                  • Intel Xeon E3
                8/4/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3798, HMAC #3067
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3798, HMAC #3067
                1290Google LLC
                1600 Amphitheatre Parkway
                Mountain View, CA 94043
                USA

                Titan Key FIPS officer
                titan-key-fips-officer@google.com

                Titan Key

                1.0


                Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

                  • N/A
                7/28/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256
                  • Prerequisite: DRBG #1558
                1289Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Petra Manche
                +44 1189 245470

                Chris Brych
                +1 613.216.3078

                Oracle ILOM OpenSSL FIPS Object Module

                2.0.10


                Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 1402 as a software module, multichip standalone module embodiment.

                  • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
                  • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
                7/28/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1288Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS SSL Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3
                  • Intel i5
                  • Intel i7
                7/28/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1543
                1287Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS SSL Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3
                  • Intel i5
                  • Intel i7
                7/28/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #3792
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #3792, HMAC #3063
                1286Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS SSL Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3
                  • Intel i5
                  • Intel i7
                7/28/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3792, DRBG #1543
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3792, DRBG #1543
                1285Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

                10.0.15063


                The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/28/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1284Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

                10.0.15063


                The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/28/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3790
                1283Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

                10.0.15063


                The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/28/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1282Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

                10.0.15063


                The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/28/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1281Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

                10.0.15063


                The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/21/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                1280Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

                10.0.15063


                The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/21/2017
                • RSASP1:
                  • Modulus Size: 2048 (bits)
                  • Padding Algorithms: PKCS 1.5
                1279Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

                10.0.15063


                The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/21/2017
                • ECDSA SigGen:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                  • Prerequisite: DRBG #1555
                1278Microsoft Corporation
                One Microsoft Way
                Redmond, WA 98052-6399
                USA

                Mike Grimm
                FIPS@microsoft.com
                800-Microsoft

                Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

                10.0.15063


                The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
                  • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
                  • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
                  • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
                  • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
                  • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
                  • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                  • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
                7/21/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
                  • Pre-shared Key Length: 64-2048
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-384
                  • Prerequisite: SHS #3790, HMAC #3061
                • IKEv2:
                  • Derived Keying Material length: 192-1792
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-256
                    • Diffie-Hellman shared secret:
                      • Length: 256 (bits)
                      • SHA Functions: SHA-256
                    • Diffie-Hellman shared secret:
                      • Length: 384 (bits)
                      • SHA Functions: SHA-384
                  • Prerequisite: SHS #3790, HMAC #3061
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3790, HMAC #3061
                1277Hewlett-Packard Development Company, L.P.
                11445 Compaq Center Drive W
                Houston, TX 77070
                USA

                Timothy McDonough
                timothy.mcdonough@hpe.com

                Hewlett Packard Enterprise SSL Crypto Module Engine

                2.1


                Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

                  • ARM i.MX6 w/ Yocto Linux 3.0.35
                7/21/2017
                • ECC CDH:
                  • Primitive
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                1276SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

                3.0


                This test covers assembler implementation of AES, SHA and GHASH.

                  • z13 w/ SUSE Linux Enterprise Server 12 SP2
                7/21/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3788, ECDSA #1131, DRBG #1552
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3788, DSA #1221, DRBG #1552
                1275Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x7416
                Fax: 613-225-9951

                Fortinet FortiWeb SSL Cryptographic Library

                5.5 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiWeb SSL Cryptographic Library v5.5 running on Intel x86 compatible processors.

                  • Intel Xeon E5 series
                7/21/2017
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                1274McAfee, Inc.
                2821 Mission College Blvd.
                Santa Clara, CA 95054
                USA

                Mark Hanson
                Mark_Hanson@McAfee.com
                972-963-7326

                McAfee NSP NS SSH Lib

                6.4_8.1.17.30 (Firmware)


                Cryptographic services for the McAfee NSP Intrusion Prevention appliances

                  • Intel Xeon E5 Family
                  • Intel Atom C Family
                7/21/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-512
                  • Prerequisite: SHS #3783
                1273McAfee, Inc.
                2821 Mission College Blvd.
                Santa Clara, CA 95054
                USA

                Mark Hanson
                Mark_Hanson@McAfee.com
                972-963-7326

                McAfee NSP NS Crypto Lib

                2.0.5_8.1.17.30 (Firmware)


                Cryptographic services for the McAfee NSP Intrusion Prevention appliances

                  • Intel Xeon E5 Family
                  • Intel Atom C Family
                7/21/2017
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #3783, HMAC #3055
                1272Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS FIPS Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3 Series
                  • Intel i5 Series
                  • Intel i7 Series
                7/14/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
                  • Pre-shared Key Length: 128-1016
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 3072 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 8192 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3777, HMAC #3050
                • IKEv2:
                  • Derived Keying Material length: 1056-3072
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 8192 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3777, HMAC #3050
                1271Fortinet Inc.
                1090 Kifer Road
                Sunnyvale, CA 94086-5301
                USA

                Alan Kaye
                akaye@fortinet.com
                613-225-9381 x87416
                Fax: 613-225-9951

                Fortinet FortiOS FIPS Cryptographic Library

                5.4 (Firmware)


                This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

                  • ARM v5 Compatible (SoC2)
                  • ARM v7 Compatible (SoC3)
                  • Intel Celeron
                  • Intel Xeon E5
                  • Intel i3 Series
                  • Intel i5 Series
                  • Intel i7 Series
                7/14/2017
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3777, DRBG #1543
                1270Pulse Secure LLC
                2700 Zanker Road Suite 200
                San Jose, CA 95134
                USA

                Yvonne Sang
                ysang@pulsesecure.net
                510-303-3804

                Pulse Secure Cryptographic Module ECDH

                2.0


                The Pulse Secure Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies.

                  • MAG2600, Intel Atom, N270, 1.6GHz w/ IVE OS 2.0 (32-bit)
                  • Dell Power Edge R430/R530, Intel Xeon E5-2620 v4 2.1GHz w/ IVE OS 2.0 (64-bit) on VMware ESXI 6.0
                  • MAG6610, SM360, Intel Core-2 Quad Q9400 2.66GHz w/ IVE OS 2.0 (64-bit)
                  • PSA300, PSA3000, Intel Celeron Processor J1900 2.42GHz w/ IVE OS 2.0 (64-bit)
                  • MAG4610, SM160, Intel Core 2 Duo E2160 1.8 GHz w/ IVE OS 2.0 (64-bit)
                  • PSA7000f, PSA7000c, Intel Xeon E3-1275v3(x86) w/ IVE OS 2.0 (64-bit)
                  • PSA5000, Intel PENTIUM G3420 2C/2T 3.2G w/ IVE OS 2.0 (64-bit)
                7/14/2017
                • KAS ECC:
                  • Functions: Domain Parameter Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-512
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-512
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3577, ECDSA #1026, DRBG #1384
                1269Oracle Communications
                100 Crosby Drive
                Bedford, MA 01730
                USA

                Madhu Mathiyalagan
                madhu.mathiyalagan@oracle.com
                (781) 578-7514

                Chris Brych
                chris.brych@oracle.com
                (613) 216-3078

                Oracle Acme Packet Mocana Cryptographic Library

                ECz 7.5.0


                The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

                  • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
                7/14/2017
                • IKEv1:
                  • Methods: Pre-shared Key
                  • Pre-shared Key Length: 128-256
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #3775, HMAC #3049
                • SSH:
                  • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #3775
                1268Symantec Corporation
                350 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SG VA SNMP Library

                5.7.2_1


                The SG VA SNMP Library provides the necessary SNMP protocol support developed specifically for use in the Secure Web Gateway appliance line.

                  • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
                7/14/2017
                • SNMP:
                1267Symantec Corporation
                350 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SG VA SSH Library

                7.2_2


                The SG VA SSH Library provides the necessary SSH key derivation functionality developed specifically for use in the Secure Web Gateway appliance line.

                  • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
                7/14/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3772
                1266Symantec Corporation
                350 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SG VA Cryptograpchic Library

                4.1.1


                The SG VA Crypto Library provides the necessary cryptographic services developed specifically for use in the Secure Web Gateway appliance line.

                  • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
                7/14/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3772, DRBG #1541
                • KAS FFC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3772, DRBG #1541
                1265Symantec Corporation
                350 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SG VA TLS Library

                4.1.1


                The SG VA TLS Library provides the necessary SSL/TLS protocol support developed specifically for use in the Secure Web Gateway appliance line.

                  • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
                7/14/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3772, HMAC #3046
                1264SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE OpenSSL using SHA assembler

                3.0


                This test covers generic assembler implementation of SHA.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                7/14/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3771, HMAC #3045
                1263SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE OpenSSL using SHA assembler

                3.0


                This test covers generic assembler implementation of SHA.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                7/14/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3771, ECDSA #1127, DRBG #1539
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3771, DSA #1220, DRBG #1539
                1262Forcepoint LLC
                10900-A Stonelake Blvd
                Ste. 350
                Austin, TX 78759
                USA

                Klaus Majewski
                legal@forcepoint.com
                1-858-320-8000

                Jorma Levomäki
                legal@forcepoint.com
                1-858-320-8000

                Forcepoint NGFW Cryptographic Library Module (3305)

                2.0


                Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

                  • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
                7/14/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3767, ECDSA #1126, DRBG #1534
                • KAS FFC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3767, DSA #1219, DRBG #1534
                1261Forcepoint LLC
                10900-A Stonelake Blvd
                Ste. 350
                Austin, TX 78759
                USA

                Klaus Majewski
                legal@forcepoint.com
                1-858-320-8000

                Jorma Levomäki
                legal@forcepoint.com
                1-858-320-8000

                Forcepoint NGFW Cryptographic Library Module (2105)

                2.0


                Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

                  • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
                7/14/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3766, ECDSA #1125, DRBG #1533
                • KAS FFC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3766, DSA #1218, DRBG #1533
                1260Forcepoint LLC
                10900-A Stonelake Blvd
                Ste. 350
                Austin, TX 78759
                USA

                Klaus Majewski
                legal@forcepoint.com
                1-858-320-8000

                Jorma Levomäki
                legal@forcepoint.com
                1-858-320-8000

                Forcepoint NGFW Cryptographic Library Module (325)

                2.0


                Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

                  • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
                7/14/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-224, P-256, P-384, P-521
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3765, ECDSA #1124, DRBG #1532
                • KAS FFC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3765, DSA #1217, DRBG #1532
                1259IBM Corporation
                2455 South Road
                Poughkeepsie, New York 12601-5400
                USA

                John Monti
                jmonti@us.ibm.com
                845-435-4164

                IBM z/OS(R) Cryptographic Services ICSF PKCS #11

                OA52336


                ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

                  • IBM z13 w/ IBM z/OS(R) v2.2
                7/8/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                    • One Pass DH:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                    • Static Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EB:
                          • Curve: P-224
                          • SHA: SHA-224
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3761, ECDSA #1123, DRBG #1530
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • MQV1:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                    • dhStatic:
                      • Key Agreement Roles: Initiator, Responder
                  • Prerequisite: SHS #3761, DSA #1216, DRBG #1530
                1258Cisco Systems, Inc
                170 W Tasman Drive
                San Jose, California 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                IOS Common Cryptographic Module (IC2M)

                Rel5 (Firmware)


                The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

                  • MIPS64
                  • Intel Atom
                  • Intel Xeon on ESXi 5.5
                  • PPC405
                  • PPCe500
                  • PPCe5500
                  • Intel Core i3
                  • Intel Pentium
                  • Intel Xeon
                  • PPC465
                7/8/2017
                • IKEv1:
                  • Methods: Digital Signature, Pre-shared Key
                  • Pre-shared Key Length: 8-224
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #3760, HMAC #3034
                • IKEv2:
                  • Derived Keying Material length: 1056-3072
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #3760, HMAC #3034
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128, 192, 256 (bits)
                  • Prerequisite: AES #4583
                • SSH:
                  • SHA Functions: SHA-1
                  • Prerequisite: SHS #3760
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3760, HMAC #3034
                1257Cisco Systems, Inc
                170 W Tasman Drive
                San Jose, California 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6250

                IOS Common Cryptographic Module (IC2M)

                Rel5 (Firmware)


                The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

                  • MIPS64
                  • Intel Atom
                  • Intel Xeon on ESXi 5.5
                  • PPC405
                  • PPCe500
                  • PPCe5500
                  • Intel Core i3
                  • Intel Pentium
                  • Intel Xeon
                  • PPC465
                7/8/2017
                • KAS ECC:
                  • Functions: Full Public Key Validation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: ECDSA #1122, DRBG #1529
                • KAS FFC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3760, DRBG #1529
                1256L3 Communications Canada / Targa Systems Division
                2081 Merivale Road
                Ottawa, ON K2G1G9
                Canada

                Dave Saunders
                Dave.Saunders@l-3com.com
                613-727-9876
                Fax: 613-727-1705

                Series 4 Gen 3 DTU

                1.0.0-32004093 (Firmware)


                Network Attached Storage device with removable storage.

                  • Freescale P1022
                6/30/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3755
                1255Oracle Communications
                100 Crosby Drive
                Bedford, MA 01730
                USA

                Madhu Mathiyalagan
                madhu.mathiyalagan@oracle.com
                (781) 578-7514

                Chris Brych
                chris.brych@oracle.com
                (613) 216-3078

                Oracle Acme Packet OpenSSL Cryptographic Library

                ECz 7.5.0


                The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

                  • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
                6/30/2017
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128 (bits)
                  • Prerequisite: AES #4577
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3754, HMAC #3028
                1254Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Linda Gallops
                linda.gallops@oracle.com
                +1 704.972.5018
                Fax: +1 980.355.5399

                Chris Brych
                chris.brych@oracle.com
                +1 613.216.3078

                Oracle Linux 6 OpenSSH Server & Client

                R6-1.0.0


                Oracle Linux OpenSSH Cryptographic Module is a software module which supplies cryptographic support for the SSH protocol

                  • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
                6/30/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3714, SHS #3716, SHS #3718
                1253Oracle Corporation
                500 Oracle Parkway
                Redwood Shores, CA 94065
                USA

                Linda Gallops
                linda.gallops@oracle.com
                +1 704.972.5018
                Fax: +1 980.355.5399

                Chris Brych
                chris.brych@oracle.com
                +1 613.216.3078

                Oracle Linux 7 OpenSSH Server & Client

                R7-2.0.0


                Oracle Linux OpenSSH Cryptographic Module is a software module that supplies cryptographic support for the SSH protocol.

                  • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
                6/30/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3715, SHS #3717, SHS #3719
                1252F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3753, ECDSA #1120, DRBG #1523
                1251F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-2658 v3 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3750, ECDSA #1119, DRBG #1520
                1250F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3749, ECDSA #1118, DRBG #1519
                1249F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3747, ECDSA #1117, DRBG #1517
                1248F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-1650 v4 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3745, ECDSA #1116, DRBG #1515
                1247F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                Ravi Kasinadhuni
                R.Kasinadhuni@f5.com
                206-272-7467

                Crypto for BIG-IP with AES and SHA assembler

                12.1.2 HF2


                Cryptographic library offering various cryptographic mechanisms to BigIP product.

                  • Intel E5-1630 v4 w/ BIG-IP 12.1.2 HF2
                6/23/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3743, ECDSA #1115, DRBG #1115
                1246Futurex
                864 Old Boerne Road
                Bulverde, TX 78163
                USA

                Futurex Security Certifications
                certifications@futurex.com
                830-980-9782

                OpenSSL

                6.2.0.0 (Firmware)


                The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

                  • TI AM3352
                6/23/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3741, HMAC #3015
                1245Cisco Systems, Inc.
                170 West Tasman Drive
                San Jose, CA 95134
                USA

                Kelvin Desplanque
                kdesplan@cisco.com
                6137887216

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon
                6/23/2017
                • IKEv2:
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 (bits)
                      • SHA Functions: SHA-1
                  • Prerequisite: SHS #3739, HMAC #3013
                • SNMP:
                • SRTP:
                  • AES Key Lengths: 128, 192, 256 (bits)
                  • Prerequisite: AES #4561
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3739
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3739, HMAC #3013
                1244Cisco Systems, Inc.
                170 West Tasman Drive
                San Jose, CA 95134
                USA

                Kelvin Desplanque
                kdesplan@cisco.com
                6137887216

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

                  • Intel Xeon
                6/23/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-512
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-512
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3739, ECDSA #1113, DRBG #1509
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3739, DSA #1213, DRBG #1509
                1240Google LLC
                1600 Amphitheatre Parkway
                Mountain View, CA 94043
                USA

                Adam Langley
                security@chromium.org

                BoringCrypto

                24e5886c0edfc409c8083d10f9f1120111efd6f5


                A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

                  • POWER9 w/ Ubuntu Linux 17.04
                  • POWER8 w/ Ubuntu Linux 17.04
                  • Intel Xeon E5 w/ Ubuntu Linux 16.04
                  • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
                  • POWER8 without PAA w/ Ubuntu Linux 15.04
                6/21/2017
                • ECDSA SigGen:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1507
                1239Symantec Corporation
                305 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                ASG SNMP Library

                5.7.2_1


                The SGOS SNMP Library provides the necessary SNMP protocol support developed specifically for use in the ProxySG, Reverse Proxy, and ASG.

                  • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
                  • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Broadwell w/ SGOS 6.7
                6/21/2017
                • SNMP:
                1238Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
                312 Kings Way
                South Melbourne, Victoria 3025
                Australia

                John Weston
                john.weston@senetas.com
                +61 3 9868 4555
                Fax: +61 3 9821 4899

                CN9000 Series Common Crypto Library

                3.0.1 (Firmware)


                The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                  • ARM Cortex A9
                6/21/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3734
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3734, HMAC #3010
                1237Symantec Corporation
                305 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SGOS TLS Library

                4.1.1


                The SGOS TLS Library provides the necessary SSL/TLS protocol support developed specifically for use in the ProxySG, Reverse Proxy, and ASG.

                  • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
                  • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
                6/21/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3730, HMAC #3006
                1236Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
                312 Kings Way
                South Melbourne, Victoria 3025
                Australia

                John Weston
                john.weston@senetas.com
                +61 3 9868 4555
                Fax: +61 3 9821 4899

                CN6000 Series Common Crypto Library

                3.0.1 (Firmware)


                The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                  • Intel ATOM
                6/21/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3733
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3733, HMAC #3009
                1235Symantec Corporation
                384 Santa Trinita Ave
                Sunnyvale, California 94085
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SGOS SNMP Library

                5.7.2_1


                The SGOS SNMP Library provides the necessary SNMP protocol support to a proprietary operating system (SGOS 6.7) developed specifically for use in the ProxySG and Reverse Proxy appliance lines.

                  • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
                6/21/2017
                • SNMP:
                1234Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
                312 Kings Way
                South Melbourne, Victoria 3205
                Australia

                John Weston
                john.weston@senetas.com
                +61 3 9868 4555
                Fax: +61 3 9821 4899

                CN8000 Series Common Crypto Library

                3.0.1 (Firmware)


                The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                  • Intel Xeon
                6/21/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3732
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3732, HMAC #3008
                1233Symantec Corporation
                305 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SGOS SSH Library

                7.2_2


                The SGOS SSH Library provides the necessary SSH key derivation functionality developed specifically for use in the ProxySG, Reverse Proxy, and ASG.

                  • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
                  • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Broadwell w/ SGOS 6.7
                6/21/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3730
                1232Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
                312 Kings Way
                South Melbourne, Victoria 3025
                Australia

                John Weston
                john.weston@senetas.com
                +61 3 9868 4555
                Fax: +61 3 9821 4899

                CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

                3.0.1 (Firmware)


                The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                  • ARM Cortex A9
                6/21/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3731
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Prerequisite: SHS #3731, HMAC #3007
                1231Symantec Corporation
                305 Ellis Street
                Mountain View, CA 94043
                USA

                Ian Hall
                Ian_hall@symantec.com
                703-598-6876

                Diana Robinson
                diana_robinson@symantec.con
                845-454-6397

                SGOS Cryptographic Library

                4.1.1


                The SGOS Crypto Library provides the necessary cryptographic services to a proprietary operating system (SGOS 6.7) developed specifically for use in the ProxySG, Reverse Proxy and ASG.

                  • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
                  • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
                  • Intel Xeon E5 Broadwell w/ SGOS 6.7
                6/21/2017
                • KAS ECC:
                  • Functions: Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #3730, DRBG #1502
                • KAS FFC:
                  • Functions: Full Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-256
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #3730, DRBG #1502
                1230Attivo Networks, Inc.
                47697 Westinghouse Drive, Suite 201
                Fremont, CA 94539
                USA

                Satya Das
                510 623-1000

                Attivo Cryptographic Module

                1.0 (Firmware)


                Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                  • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI
                  • Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.4GHz with AES-NI
                6/16/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-512
                  • Prerequisite: SHS #3403
                1229Attivo Networks, Inc.
                47697 Westinghouse Drive, Suite 201
                Fremont, CA 94539
                USA

                Satya Das
                510 623-1000

                Attivo Cryptographic Module

                1.0 (Firmware)


                Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                  • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI
                  • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz with AES-NI
                6/16/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3403, HMAC #2706
                1228Attivo Networks, Inc.
                47697 Westinghouse Drive, Suite 201
                Fremont, CA 94539
                USA

                Satya Das
                510 623-1000

                Attivo Cryptographic Provider

                1.0 (Firmware)


                Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                  • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz
                  • Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.4GHz
                6/16/2017
                • SSH:
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3638
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3638, HMAC #2933
                1227Bivio Networks, Inc.
                4457 Willow Road, Suite 240
                Pleasanton, CA 94588
                USA

                Raj Srinivasan
                raj@bivio.net
                (925) 924-8608
                Fax: (925) 924-8650

                OpenSSL

                1.0.1e-51


                OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

                  • Intel(R) Atom(TM) CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
                6/16/2017
                • RSADP:
                  • Modulus Size: 2048 (bits)
                  <