Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

DSA Validation List

This list identifies implementations that have been validated as conforming to the Digital Signature Algorithm (DSA), as specified in Federal Information Processing Standard (FIPS) 186-2 with Change Notice 1 and FIPS 186-4, using tests described in the (186-2) Digital Signature Algorithm Validation System (DSAVS) and (186-4) Digital Signature Algorithm Validation System (DSA2VS).

As of May 19, 2007, in accordance with the SP 800-57 Transition Plan, the use of modulus sizes providing less than 80 bits of security strength is no longer approved.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of modulus sizes providing less than 112 bits of security strength, and the use of SHA-1 with Digital Signature Generation excluding use with protocols, is no longer approved.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, the use of RNGs specified in FIPS 186-2, [X9.31], and the 1998 version of [X9.62] as a prerequisite for validation testing is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
1446Blue Cedar
325 Pacific Avenue
San Francisco, CA 94111
USA

FIPS Admin
fips@bluecedar.com
415-329-0401

Blue Cedar Cryptographic Module

2.0.16


The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Nvidia Tegra X1 with PAA w/ Android 8.1
    • Nvidia Tegra X1 without PAA w/ Android 8.1
    • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
    • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
8/10/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4526, DRBG #2277
1445Q Core Medical Ltd.
29 Yad Harutsim St.
Netanya 4250529
Israel

Nimrod Schweitzer
nimrod.schweitzer@gcore.com
+972-73-2388839
Fax: +972-73-2388800

Lee Aydelotte
laydelotte@silexamerica.com
801-676-8673
Fax: 714-258-0730

QCore OpenSSL FIPS Object Module 2.0.9

2.0.9


QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

    • NXP i.MX280 ARM w/ Linux 2.6.35
8/10/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4525, DRBG #2276
1444BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 8.0.1 on Venturi KT960 Tablet
8/2/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: SHS #4506, DRBG #2251
1443BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
8/2/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: SHS #4505, DRBG #2250
1442Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4499, DRBG #2246
1441Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4498, DRBG #2245
1440Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4491, DRBG #2236
1439Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4490, DRBG #2235
1438Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4489, DRBG #2234
1437Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4488, DRBG #2233
1436Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4487, DRBG #2232
1435Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4480, DRBG #2225
1434Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certification Team
SecurityCertfications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
7/20/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224
        • L = 2048, N = 256 SHA: SHA-1, SHA-224
        • L = 3072, N = 256 SHA: SHA-1, SHA-224
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4476, DRBG #1704
1433Entrust Datacard Corporation
Two Lincoln Centre
5420 LBJ Freeway Suite 300
Dallas, TX 75240
USA

John Gray
John.Gray@entrustdatacard.com

John Mahoney
John.Mahoney@entrustdatacard.com

Entrust Authority™ Security Toolkit for the Java® Platform DSA 1.0

1.0


The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

    • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
7/20/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #4475
1432HP Inc.
11311 Chinden Blvd
Boise, Idaho 83714-0021
USA

Gerardo Colunga
gerardo.del.colunga@hp.com
208-333-5607

Chris Gunning
chris.gunning@hp.com
208-333-6785

HP FutureSmart QuickSec

5.1 (Firmware)


HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

    • Arm Cortex-A8
7/20/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4474, DRBG #2220
1431Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(678) 473-2907
Fax: (678) 473-8470

Mike Jamison
(678) 473-2907
Fax: (678) 473-8470

Cloudpath Cryptographic Library

1.0


Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

    • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
    • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
7/20/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4143, DRBG #1901
1430Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(650) 265-4200
Fax: (408) 738-2065

Mike Jamison
(678) 473-2907
Fax: (678) 473-8470

Cloudpath Cryptographic Library for Java

1.0


Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
7/20/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4318, DRBG #2083
1429Nutanix
1740 Technology Drive, Suite 150
San Jose, CA 95110
USA

Eric Hammersley
fips@nutanix.com

Ashutosh Pangasa
fips@nutanix.com

Nutanix Cryptographic Library for OpenSSL

1.0


The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

    • Intel E5-2620 w/PAA w/ CentOS 7.4
7/20/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4465, DRBG #2216
1428Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0 (Firmware)


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • Intel Atom C Series
    • P2020
    • P2041
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4457, DRBG #2209
1427International Business Machines
1702 North Street
Building 256-3
Endicott, NY 13760
USA

Brian W. Hugenbruch
bwhugen@us.ibm.com
607-429-3660

IBM z/VM System SSL

V6.4


z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

    • IBM z13 w/ IBM z/VM V6.4
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #4456, DRBG #2208
1426SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply Server Engine

2.1


SafeLogic''s CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4455, DRBG #2207
1425Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat OpenSSL (64bit)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4450, DRBG #2199
1424Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat NSS Softoken (64bit)

5.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4449, DRBG #2198
1423Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • P2020 w/ CentOS 5.8
    • P2041 w/ CentOS 5.8
    • Intel Atom C Series w/ CentOS 6.6
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4447, DRBG #2196
1422Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Allen Ting
yting@juniper.net
408-858-5008

Mounir Hahad
mhahad@juniper.net

CryptoCore

1.0


Cryptographic module to support the cryptographic functionalities for Juniper products.

    • Intel Core i5 w/ Ubuntu Linux 14.04
    • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
    • Intel Xeon E5 family w/ Ubuntu Linux 14.04
7/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4446, DRBG #2195
1421BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
    • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
    • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
    • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
7/13/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: SHS #4445, DRBG #2194
1420Konica Minolta, Inc.
2970, Ishikawa-machi
Hachioji-shi, Tokyo 192-8505
Japan

R&D Administration Division, R&D Headquarters Business Techn

Konica Minolta PP Crypto Library

1.1 Rev.1 (Firmware)


Konica Minolta PP Crypto Library is used in AccurioPress C2060/C2070, AccurioPrint C2060L and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

    • Intel(R) Core(TM) i5-4570S
    • Intel(R) Pentium G3420
7/13/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #2193
1419Infosec Global Inc.
2225 Sheppard Avenue East
Suite 1402
Toronto, Ontario M2J 5C2
Canada

Brian Neill
brian.neill@infosecglobal.com
416-492-3333
Fax: 647-343-6933

Ian Laidlaw
ian.laidlaw@infosecglobal.com
416-492-3333
Fax: 647-343-6933

AgileSec FIPS Provider 1.0

1.0


AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Core i5 CPU with AES-NI w/ OSX 10.12
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Intel Core i5 CPU without AES-NI w/ OSX 10.12
    • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
7/13/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4441, DRBG #2192
1418Accellion, Inc.
1804 Embarcadero Road
Suite 200
Palo Alto, Ca 94303
USA

Frank Balonis
frank.balonis@accellion.com
650-485-4300

Sim Han Seah
hanseah@accellion.com
+65 6244 5678

Accellion Cryptographic Module

2.0.16


The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ CentOS 6
    • Intel Xeon E5 with PAA w/ CentOS 6
7/6/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4440, DRBG #2191
1417SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply for Java

3.0.1


SafeLogic''s CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
    • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
7/6/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4439, DRBG #2190
1416Harris Corporation
1680 University Avenue
Rochester, NY 14610
USA

Chris Wood
cwood06@harris.com
585-720-8730
Fax: 585-241-8459

Esther Betancourt
ebetanco@harris.com
585-242-3635
Fax: 585-241-8459

Harris Broadband Ethernet Radio GPP Cryptographic Library

6.0 (Firmware)


This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

    • Broadcom XLS108
6/29/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #4434, DRBG #2187
1415Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (3305)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon E5
6/29/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4424, DRBG #2181
1414Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (2101)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon D
6/29/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4423, DRBG #2180
1413Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (1101)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Pentium D
6/29/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4422, DRBG #2179
1412Securosys SA
Forrlibuckstrasse 70
Zurich, Zurich 8005
Switzerland

Marcel Dasen
dasen@securosys.ch
+41 44 552 31 33

Robert Rogenmoser
roro@securosys.ch
+41 44 552 31 11

Primus HSM Cryptographic Library

XC7K160T 2.5.3 (Firmware)


Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

    • Marvell Armada XP PJ4Bv7
6/15/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4402, DRBG #2160
1411Trend Micro Inc.
11305 Alterra Parkway
Austin, TX 78758
USA

Paul Tucker
paul_tucker@trendmicro.com
512-633-7945

Trend Micro, TippingPoint Crypto Core OpenSSL

2.0.13


The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

    • Intel Core i3 without AES-NI w/ Linux 4.4
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
    • Intel Xeon E5 with AES-NI w/ Linux 4.4
6/15/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4401, DRBG #2159
1410Arista Networks Inc.
5453 Great America Pkwy
Santa Clara, CA 95054
USA

Richard Whitney
rw@arista.com
703-627-6092
Fax: 408-538-8920

Ethan Rahn
erahn@arista.com
408-547-5825

EOS MACsec Hybrid Firmware v1.0

1.0 (Firmware)


The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

    • Intel Xeon E3
    • AMD GX Series
    • Intel Pentium B9
    • Intel Xeon D-1500
    • AMD GE Series
6/15/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4399, DRBG #2158
1409DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

TBD
TBD
TBD

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • SH7757 w/ Linux 3.16.47
6/15/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4396, DRBG #2156
1408DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

TBD
TBD
TBD

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • 440EPX w/ Linux 4.9.31
6/15/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4395, DRBG #2155
1407Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 NSS without AES-NI

R6-1.0.0


Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
6/8/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4391, DRBG #2151
1406Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Brian Wood
be.wood@samsung.com
+1-973-440-9125

Samsung BoringSSL Cryptographic Module

v1.2.1


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Qualcomm SDM845 w/ Android 8.1
    • Samsung Electronics Exynos 9810 w/ Android 8.1
    • Qualcomm MSM8998 w/ Android 8.1
    • Qualcomm SDM450 w/ Android 8.1
6/8/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4389, DRBG #2149
1405SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5 for TZ, NSA and SuperMassive

6.5.2 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN62XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon II (CN68XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon III (CN71XX)
6/8/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4383, DRBG #2144
1404REDCOM Laboratories, Inc
One REDCOM Center
Victor, NY 14564-0995
United States

Sal Ceravolo
Sal.ceravolo@redcom.com
585-905-0451

Chris Hasenauer
Chris.hasenauer@redcom.com
585-905-0451

REDCOM Encryption 140-2

3.0.1


REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

    • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
    • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
6/1/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4377, DRBG #2140
1403KeyNexus, Inc.
205-2657 Wilfert Road
Victoria, BC V9B6A7
Canada

Jason Novecosky
jason@keynexus.net

KeyNexus Cryptographic Library

1.0


The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

    • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
5/25/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4373, DRBG #2137
1402Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
tbd

CiscoSSL FIPS Object Module

6.0


The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Apple A10 w/ iOS 11.x
5/25/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4357, DRBG #2121
1401wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

4.0


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
5/18/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #2131
1400Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Petra Manche
+44 1189 245470

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle OpenSSL FIPS Object Module

OpenSSL_2.0.13_OracleFIPS_1.0


Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

    • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
    • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
    • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
    • SPARC S7 with PAA w/ Oracle Solaris 11.4
    • SPARC S7 without PAA w/ Oracle Solaris 11.4
    • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
    • Intel Xeon E5 with PAA w/ Solaris 11.4
    • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
    • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
5/18/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4364, DRBG #2129
1399Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Robert Truesdell
rtruesdell@splunk.com
412.913.8242

Splunk Phantom Cryptographic Library

1.0


The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

    • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
    • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
5/18/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
1398Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module Supplicant Component

CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
1397Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module Supplicant Component

CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
1396Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module Supplicant Component

CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
1395Cohesity, Inc.
300 Park Ave
Suite 800
San Jose, CA 95110
USA

Vivek Agarwal
vivek@cohesity.com
+1 (415) 690-7805

Cohesity OpenSSL FIPS Object Module

1.0.2


The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

    • Intel Xeon with AES-NI w/ CentOS 7
    • Intel Xeon without AES-NI w/ CentOS 7
5/10/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4353, DRBG #2117
1394NIKSUN, Inc.
457 N. Harrison St.
3rd Floor
Princeton, NJ 08540
USA

Darryle Merlette
merlette@niksun.com

NIKOS FIPS Object Module

2.0.16


The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN''s networking products.

    • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
5/10/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-512
        • L = 2048, N = 224 SHA: SHA-256, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4349, DRBG #2113
1393LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Donghoon Shin
hoon.shin@lge.com
82-10-2280-4056

LG BoringSSL

3.0


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

    • Snapdragon 845 (SDM845) w/ Android 8.0
    • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
    • Snapdragon 835 (MSM8998) w/ Android 8.0
5/10/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4348, DRBG #2112
1392INFINIDAT
500 Totten Pond Road
Waltham, MA 02451
USA

David Hebert
davidh@infinidat.com
+1 860-214-5666

Steve Sullivan
steves@infinidat.com
+1 781-264-1544

INFINIDAT Cryptographic Module (libcrypto)

1.0.2k


The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

    • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
5/4/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4344, DRBG #2109
1391Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
4/27/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4321, DRBG #2085
1390Seagate Technology, LLC
1280 Disc Drive
Shakopee, MN 55379
USA

David R Kaiser, PMP
david.r.kaiser@seagate.com
952-402-2356
Fax: 952-402-1273

DSA in Firmware

1.0 (Firmware)


FW Implementation of DSA in Seagate''s self encryption disk drives (SEDs)

    • ARM Cortex-R Family
4/20/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: DRBG #1146
1389Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4314, DRBG #2081
1388Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4312, DRBG #2079
1387IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2o [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
4/13/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #4311, DRBG #2078
1386VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4307, DRBG #2076
1385wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

3.14.2


The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

    • Intel x86 w/ NetBSD v6.0.1
4/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #2075
1384Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/30/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4278, DRBG #2056
1383Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4303, DRBG #2070
1382Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4300, DRBG #2068
1381SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
3/30/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4297, DRBG #2066
1380Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

Aruba Common Cryptographic Module (CCM)

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 10 64-bit User Mode
    • Intel Core i5 w/ Windows 10 32-bit User Mode
    • ARMv7 w/ Android 7.1
3/30/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #2065
1379BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
3/30/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: SHS #4294, DRBG #2063
1378BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
3/30/2018
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
      • Prerequisite: SHS #4293, DRBG #2062
1377BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4279, DRBG #2057
1376Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4278, DRBG #2056
1375Digi International, Inc.
11001 Bren Road East
Minnetonka, MN 55343
USA

Donald Schleede
Donald.Scleede@digi.com
952-912-3444

Digi ConnectCore Security Module

1.0


The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

    • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
    • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
3/16/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4275, DRBG #2053
1374Cisco Systems, Inc
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

7.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

    • ARMv8 w/ Android 7.1
    • Intel Core i5 w/ Windows 10 (with AES-NI)
    • Intel Core i7 w/ macOS 10.12 (with AES-NI)
    • Intel Core i5 w/ Windows 10
    • Intel Pentium w/ Linux 3.4
    • ARMv8 w/ iOS 11.2
    • Intel Core i7 w/ macOS 10.12 (without AES-NI)
    • Cavium Octeon II 68XX w/ Wind River Linux 4
    • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
    • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
3/16/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4267, DRBG #2048
1373Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

10.0.15063.728


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
3/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4253, DRBG #2037
1372Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5.01 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
3/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224
        • L = 2048, N = 256 SHA: SHA-1, SHA-224
        • L = 3072, N = 256 SHA: SHA-1, SHA-224
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4252, DRBG #1704
1371Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

10.0.14393.1770


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
    • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
3/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4250, DRBG #2036
1370Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

10.0.10240.17643


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
3/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4248, DRBG #2035
1369Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

10.0.10586.1176


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
    • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
    • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
3/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4246, DRBG #2033
1368Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Michael Arrowsmith
415-848-8400

Splunk Cryptographic Module

2.0.16


The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ Ubuntu 16.04
    • Intel Xeon E5 with PAA w/ Ubuntu 16.04
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4238, DRBG #2019
1367Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL with FOM 6.0

6.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon w/ ADE-OS v3.0
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4237, DRBG #2018
1366Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS OpenSSL Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ8064
    • Qualcomm IPQ4029
    • NXP QorIQ T1024
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #4236, DRBG #2017
1365Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ4029
    • Qualcomm IPQ8064
    • NXP QorIQ T1024
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #4235
1364IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2n [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
1363Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4233, DRBG #2015
1362Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
2/23/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4232, DRBG #2012
1361Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.2


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos7883 w/ Android 8.0
    • Qualcomm MSM8998 w/ Android 8.0
    • Qualcomm MSM8996 w/ Android 8.0
    • Qualcomm SDM845 w/ Android 8.0
    • Samsung Electronics Exynos8890 w/ Android 8.0
    • Samsung Electronics Exynos9810 w/ Android 8.0
    • Samsung Electronics Exynos8895 w/ Android 8.0
    • Samsung Electronics Exynos7570 w/ Android 8.0
    • Samsung Electronics Exynos7884 w/ Android 8.0
2/16/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4230, DRBG #2010
1360Mocana Corporation
150 Mathilda Place
Suite 208
Sunnyvale, CA 94086
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.5.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Intel Atom E3800 w/ Wind River Linux 6.0
2/16/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4229, DRBG #2009
1359Silver Spring Networks
230 W Tasman Drive
San Jose, CA 95134
USA

Andrew Pendray
support@ssni.com
+1 669 770 4000
Fax: +1 886 776 0015

Silver Spring Networks Endpoint Security Module

130-0117-03 82136; 1.00 (Firmware)


Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

    • ESM instruction manager processor
2/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #4148, DRBG #1906
1358Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 libgcrypt

R7-2.0.0


The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4217, DRBG #2003
1357Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 libgcrypt

R7-2.0.0


The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

    • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4211, DRBG #1997
1356Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4210, DRBG #1996
1355IBM Corporation
222 South Riverside Plaza
Ste 1700
Chicago, IL 60606
USA

Mark Seaborn
mseaborn@us.ibm.com
+1 312 423 6640x2354

IBM Cloud Object Storage System's™ FIPS Cryptographic Module

1.1


The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

    • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
    • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4209, DRBG #1995
1354Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dylib

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ iOS 10.3.3
2/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #2074
1353Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

libancrypto.so

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Linux 2.6 64-bit
2/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1994
1352Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dll

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 7 64-bit User Mode
    • Intel Core i5 w/ Windows 7 32-bit User Mode
2/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #496
1351Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

libancrypto.so

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ Android 6.0.1
    • Intel Core i5 w/ Linux 2.6 32-bit
2/9/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #498
1350Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 32-bit library)

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4207, DRBG #1993
1349Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 64-bit library)

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4202, DRBG #1984
1348Gallagher Group
181 Kahikatea Drive
Hamilton 3206
New Zealand

Andrew Scothern
andrew.scothern@gallagher.com
+64-7-838-9800

Simon Lawrence
simon.lawrence@gallagher.com
+64-7-838-9800

Gallagher OpenSSL Cryptographic Module

2.0.12


Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

    • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4196, DRBG #1978
1347Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 32-bit library)

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
2/9/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4194, DRBG #1976
1346Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 64-bit library)

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
2/2/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4193, DRBG #1975
1345Centrify Corporation
3300 Tannery Way
Santa Clara, California 95054
USA

Kitty Shih
kitty.shih@centrify.com
669-444-5238

Centrify Cryptographic Library

2.1


Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

    • Intel Xeon X5650 x86_64 w/ RHEL 7.2
2/2/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4185, DRBG #1956
1344Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Brian Wood
be.wood@samsung.com
+1-973-440-9125

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung SCrypto Library

v2.2


Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

    • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
    • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
    • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
2/2/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4184, DRBG #1955
1343Datrium
385 Moffett Park Dr #205
Sunnyvale, CA 94089
USA

R. Hugo Patterson
info@datrium.com
+1 (669) 721-9444

Datrium FIPS Object Module

2.0.12


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • Intel Xeon E5-2618L v4 w/ Linux 3.10
    • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
    • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
1/26/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4182, DRBG #1953
1342SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Sales
sales@safelogic.com

CryptoComply® Server

2.1


CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

    • Intel i7 w/ Windows Server 2012 R2
1/26/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4177, DRBG #1947
1341IBM Corporation
80 Bishop Dr., Unit B
Fredericton, New Brunswick E3C 1B2
Canada

Rory Bray
rory.bray@ca.ibm.com
506-449-7810

Marshall Yang
marshall.yang@ibm.com
506-449-7810

Cryptographic Security Kernel

1.0


The IBM Cryptographic Security Kernel is a multi-algorithm library providing general-purpose cryptographic services. The module provides a single, FIPS-Approved API for cryptography allowing for centralized FIPS mode status, logging, and reporting.

    • Intel Xeon w/ Red Hat Enterprise Linux (RHEL) 6.7
1/26/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #1981, DRBG #753
1340Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW FIPS Object Module

2.0.14


Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

    • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
    • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
    • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
    • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
    • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
1/26/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4175, DRBG #1946
1339Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW FIPS Object Module

2.0.13


Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
1/26/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4174, DRBG #1945
1338Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW FIPS Java API

1.0.0


Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

    • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
1/26/2018
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4173, DRBG #1944
1337Hewlett-Packard Development Company, L.P.
11445 Compaq Center Drive W
Houston, TX 77070
USA

Timothy McDonough
timothy.mcdonough@hpe.com

Hewlett Packard Enterpprise SSL Crypto Module

2.1


Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

    • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
1/12/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4147, DRBG #1905
1336Private Machines, Inc
164 20th Street
4A-4B
Brooklyn, NY 11232
USA

Sumeet Bajaj
sumeet@privatemachines.com

Radu Sion
sion@privatemachines.com

Private Machines Enforcer LIBUCL

L4-1 2.5.13 (Firmware)


The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

    • MAX32550 Cortex M3
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: DRBG #1879
1335SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

Usha Sanagala
usanagala@sonicwall.com
408-962-6248
Fax: 408-745-9300

SonicWall Crypto Library

SonicOS 6.2.5 (Firmware)


SonicWall Crypto Library

    • Cavium Octeon
1/5/2018
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #4130, DRBG #1887
1334Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A11 Bionic w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1283
1333Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A10x Fusion w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1283
1332Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A9X w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1280
1331Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A10 Fusion w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1283
1330Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A9 w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1281
1329Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A8X w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1278
1328Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A8 w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1277
1327Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module

8.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A7 w/ iOS 11
1/5/2018
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1276
1326IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL for the IBM MaaS360 Cloud Extender

2.91


The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
12/22/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3914, DRBG #1650
1325SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.0 for TZ, NSA and SuperMassive

FW Version 6.5.0 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium OCTEON III (CN7XXX)
    • Cavium OCTEON II (CN6XXX)
12/22/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4109, DRBG #1865
1324Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 GnuTLS C Implementation

R7-2.0.0


GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
12/22/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4105, DRBG #1859
1323DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

Alaric Silveira
Alaric.Silveira@dell.com

Gang Liu
gang_liu@dell.com
+1 512 728 5545

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • ARMv7 NPCMX50 w/ Linux 4.1.12
12/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4091, DRBG #1844
1322McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

Andy Nissen
andy.nissen@intel.com
651-770-6151

McAfee Advanced Threat Defense

4.0


A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

    • Intel Xeon w/ Linux 4.4.27
12/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4090, DRBG #1843
1321RSA Security LLC
174 Middlesex Turnpike
Bedford, MA 01730
USA

FIPS Program
fips-program@rsa.com

RSA BSAFE® Crypto-J JSAFE and JCE Software Module

6.2.4


RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

    • Intel Core i5 w/ Windows 10 (64-bit)
    • Intel Xeon w/ CentOS 7.3
    • Qualcomm Snapdragon w/ Android 7.1.2
12/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4085, DRBG #1841
1320Ruckus Wireless, Inc.
350 W Java Drive
Sunnyvale, CA 94089
USA

Suneetha Sarala
Suneetha.Sarala@arris.com
650-265-4200

Julie Lu
Julie.Lu@arris.com
650-265-4200

BRCD-IP-CRYPTO-VER-4.0

BRCD-IP-CRYPTO-VER-4.0 (Firmware)


Firmware algorithm for the Brocade FastIron Series

    • Freescale P2041
12/8/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4083, DRBG #1839
1319Ruckus Wireless, Inc.
350 W Java Drive
Sunnyvale, CA 94089
USA

Suneetha Sarala
Suneetha.Sarala@arris.com
650-265-4200

Julie Lu
Julie.Lu@arris.com
650-265-4200

BRCD-IP-CRYPTO-VER-4.0

BRCD-IP-CRYPTO-VER-4.0 (Firmware)


Firmware algorithm for the Brocade FastIron Series

    • ARM Cortex A57
12/8/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4082, DRBG #1838
1318Ruckus Wireless, Inc.
350 W Java Drive
Sunnyvale, CA 94089
USA

Suneetha Sarala
Suneetha.Sarala@arris.com
650-265-4200

Julie Lu
Julie.Lu@arris.com
650-265-4200

BRCD-IP-CRYPTO-VER-4.0

BRCD-IP-CRYPTO-VER-4.0 (Firmware)


Firmware algorithm for the Brocade FastIron Series

    • ARM Cortex A9
12/8/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4081, DRBG #1837
1317Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

SafeXcel 1746 Chip

SF914-17060-100B


The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

    • N/A
12/8/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4080, DRBG #1704
1316Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

Luna K6 Cryptographic Library

6.24.6 (Firmware)


The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
12/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4080, DRBG #1704
1315Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

Luna G5 Cryptographic Library

6.24.6 (Firmware)


The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4075, DRBG #1704
1314Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Cisco Security Crypto Virtual

F6.2


The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

    • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4074, DRBG #1828
1313Cavium, Inc.
2315 N 1st Street
San Jose, CA 95131
USA

Tejinder Singh
Tejinder.Singh@caviumnetworks.com
408-943-7403
Fax: 408-577-1992

Phanikumar Kancharla
Pkkancharla@caviumnetworks.com
408-943-7496

ngfips_dsa

CN52XX 1.0.1 (Firmware)


The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

    • CN52XX
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #1165, DRBG #32
1312Brocade Communications Systems LLC
120 Holger Way
San Jose, CA 95110
USA

Hamid Sabouti
hamid.sobouti@broadcom.com
408-333-4150
Fax: 408-333-3844

Brocade Fabric OS FIPS Cryptographic Module

8.2.0


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
    • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #4071, DRBG #1827
1311SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE NSS on x86 with AES-NI

2.0


SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

    • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4070, DRBG #1826
1310SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE NSS on x86 without AES-NI

2.0


SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

    • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4069, DRBG #1825
1309SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE NSS z13

2.0


SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

    • z13 w/ SUSE Linux Enterprise Server 12 SP2
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4068, DRBG #1824
1308Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded
11/30/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224
        • L = 2048, N = 256 SHA: SHA-1, SHA-224
        • L = 3072, N = 256 SHA: SHA-1, SHA-224
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4067, DRBG #1704
1307Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

SafeXcel 1746 Chip

SF914-17060-100B


The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

    • N/A
11/30/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4050, DRBG #1704
1306Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

Luna IS Cryptographic Library

6.3.2 (Firmware)


The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
11/22/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4050, DRBG #1704
1305Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6520

CiscoSSL FIPS Object Module

6.0 (Firmware)


The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Apple A10 on iOS 10.x
11/17/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4046, DRBG #1787
1304Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Cisco Security Crypto

F6.2 (Firmware)


The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

    • Intel Atom C2xxx Family, Intel Xeon 34xx Family
    • Intel Xeon E Family
    • Intel Xeon D Family
11/17/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4012, DRBG #1735
1303Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Microsoft Surface Hub SymCrypt Cryptographic Implementations

10.0.15063.674


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
11/17/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4011, DRBG #1732
1302Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

10.0.15254


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
11/17/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4010, DRBG #1731
1301Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

10.0.16299


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
11/9/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #4009, DRBG #1730
1300Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Kevin Meagher
KMeagher@ciena.com

Ciena 6500 Packet Optical Family

12.3


Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

    • PowerQUICC II w/ VxWorks 6.1
    • PowerQUICC II w/ VxWorks 6.3
11/3/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3992, DRBG #1706
1299Hewlett Packard Enterprise
8000 Foothills Blvd.
Roseville, CA 95747
USA

Susan Scotten
susan.scotten@hpe.com
1-916-540-1109

Aruba Campus Switch Series Crypto Library

16.04 (Firmware)


Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

    • Freescale P2020 Dual Core
    • Dual Core ARM Coretex
11/3/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: DRBG #1705
1298Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

SafeXcel 3120 Chip

SF114-011206-001A, v2.9.5


The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

    • N/A
11/3/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3988, DRBG #1704
1297SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE libgcrypt using generic C implementation

3.0


This test covers generic C implementation of multiple algorithms.

    • z13 w/ SUSE Linux Enterprise Server 12 SP2
11/3/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3982, DRBG #1699
1296Synopsys, Inc.
690 East Middlefield Road
Mountain View, CA 94043
USA

Dana Neustadter
danan@synopsys.com
+1(613)595-9836

DWC Cryptography Software Library

4.2.0


The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

    • ARC® EM7D Processor with CryptoPack w/ n/a
10/20/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3958, DRBG #1676
1295Infoblox
3111 Coronado Drive
Santa Clara, CA 95054
USA

Dave Funk
dfunk@infoblox.com
408-986-5591

NIOS Cryptographic Library

2.0 (Firmware)


Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

    • Intel Xeon w/ VMware ESXi 5
    • Intel Xeon
    • Intel Xeon w/ VMware ESXi 6
    • Intel Core i3
10/13/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3953, DRBG #1671
1294Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Common Cryptographic Module

AOS VMC 6.4.2.0-1.3-FIPS (Firmware)


Linux on Intel

    • Intel x86, i7
10/13/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3167, DRBG #1044
1293Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • NXP QorIQ P10XX Series
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2425, DRBG #528
1292Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ8068
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3408, DRBG #1188
1291Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Broadcom BCM53014A
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2630, DRBG #660
1290Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • XLP400 Series
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2246, DRBG #433
1289Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • XLP300 Series
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2425, DRBG #528
1288Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • XLP200 Series
10/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2425, DRBG #528
1287SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Sales
na

CryptoComply Server Engine

2.1


CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

    • Intel i7 w/ CentOS 7
9/29/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3929, DRBG #1662
1286FireEye, Inc.
1440 McCarthy Boulevard
Milipitas, CA 90655
USA

Steve Lanser
steve.lanser@fireeye.com
508-983-2505

FireEye Cryptographic Implementation

1.0


The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

    • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
9/26/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3919, DRBG #1653
1285Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Linda Gallops
linda.gallops@oracle.com
+1 704.972.5018
Fax: +1 980.355.5399

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 NSS without AES-NI

R6-1.0.0


Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
9/26/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3918, DRBG #1652
1284Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Cisco Security Crypto Virtual

F6.0


FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

    • Intel Xeon E series w/ ESXi 6.0
    • Intel Xeon E series w/ ESXi 5.5
9/15/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3913, DRBG #1649
1283SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE libgcrypt using generic C implementation

3.0


This test covers generic C implementation of multiple algorithms.

    • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
9/8/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3910, DRBG #1644
1282Lenovo Group Limited
7001 Development Drive
Morrisville, NC 27560
USA

James Takahashi
jtakahashi2@lenovo.com
503-643-8308

Taylor Greenwood
tgreenwood@lenovo.com
515-450-7432

Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

1.0


The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

    • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
9/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3905, SHS #3906, SHS #3907, DRBG #1641
1281FireEye, Inc.
1440 McCarthy Boulevard
Milipitas, CA 90655
USA

Steve Lanser
steve.lanser@fireeye.com
508-983-2505

FireEye SSL

1.0 (Firmware)


The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

    • Intel Xeon
    • Intel Xeon with ESXi 6.5
    • Intel Atom
    • AMD Opteron
9/8/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3904, DRBG #1638
1280VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

Michael McKay
mmckay@vmware.com
650-427-3615
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3902, DRBG #1637
1279Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.1


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3901, DRBG #1636
1278IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services System SSL - 64bit

OA52653


z/OS(TM) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • z13 w/ IBM z/OS(R) v2.2
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3900, DRBG #1530
1277IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services System SSL - 31bit

OA52653


z/OS(TM) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • z13 w/ IBM z/OS(R) v2.2
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3899, DRBG #1530
1276Software Diversified Services
1322 81st Ave NE
Minneapolis, MN 55432
USA

Tim Full
cavp@sdsusa.com

SDS Cryptographic Module

1.0


Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

    • Intel i7 with AES-NI w/ Windows Server 2012 R2
    • Intel i7 with AES-NI w/ Windows Server 2016
    • Intel i7 with AES-NI w/ RedHat 6.9
    • Intel i7 with AES-NI w/ RedHat 7.4
    • POWER8 w/ AIX 6.1
    • POWER8 w/ AIX 7.2
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3898, DRBG #1635
1275Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

Luna K7 Cryptographic Library

7.0.1 (Firmware)


The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

    • PowerPC 476
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3897
1274Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

Luna K7 Accelerated Cryptographic Library

7.0.1 (Firmware)


The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

    • PowerPC 476
9/1/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3896, DRBG #1634
1273SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

Ray Potter
ray@safelogic.com
650-646-1702

CryptoComply Server Engine

2.2


CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

    • Intel Celeron w/ CentOS 7.3
8/25/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3893, DRBG #1631
1272Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

Red Hat NSS Softoken (64 bit)

5.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
8/25/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3885, DRBG #1626
1271Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

Red Hat NSS Softoken (32 bit)

5.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
8/25/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3884, DRBG #1625
1270IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3883
1269IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3882
1268IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3881
1267IBM Corporation
1 New Orchard Road
Armonk, NY 10504
USA

Peter Szczepankiewicz
peter.s14@us.ibm.com
757-689-0507
Fax: 757-689-0507

Rory Bray
rory.bray@ca.ibm.com
506-449-7810
Fax: 506-449-7810

libcrypto/openssl

1.0.1e


Main crypto provider for all standard QRadar functionality

    • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
8/25/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
1266IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3879
1265IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3878
1264IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3877
1263IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3876
1262IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3875
1261IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
8/18/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3874
1260IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
8/18/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3872
1259IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
8/18/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3871
1258IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
8/18/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3870
1257IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
8/18/2017
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3869
1256DELL, INC
5450 Great America Parkway,
Santa Clara, CA 95054
US

Srihari Mandava
srihari_mandava@dell.com

Jeff Yin
Jeff_Yin@Dell.com

Dell OpenSSL Cryptographic Library

2.4


Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''''s Data Center hardened Dell Networking OS management and routing features.

    • Intel Atom C2000 w/ Dell EMC Networking OS 10.3.1
8/18/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3863, DRBG #1607
1255Ultra Electronics 3eTI
9715 Key West Avenue
Suite 500
Rockville, MD 20850
USA

Harinder Sood
harinder.sood@ultra-3eti.com
301-944-1325
Fax: 301-670-6779

Chris Guo
chris.guo@ultra-3eti.com
301-944-1294
Fax: 301-670-6779

3eTI OpenSSL Algorithm Implementation

2.0 (Firmware)


Algorithms listed are used to provide encryption and authentication services within 3eTI networking products.

    • MPC8378E
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: DRBG #822
1254Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49-D100-QuickSec

15.1X49-D100 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3857, DRBG #1603
1253Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49-D100-OpenSSL

15.1X49-D100 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3856, DRBG #1602
1252Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A10 w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1283
1251Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A9X w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1280
1250Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A9 w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1281
1249Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A8X w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1278
1248Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A8 w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1277
1247Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669) 227-3579

Apple iOS CoreCrypto Module (Generic)

7.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A7 w/ iOS 10
8/11/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1276
1246Hewlett Packard Enterprise Storage
4209 Technology Drive
Fremont, CA 94538
USA

Kurt Heberlein
kurt.w.heberlein@hpe.com
+1 512 319 1294

David Heisser
david.heisser@hpe.com
+1 650 209 0937

HPE-3PAR SSMC 3.2 with Java JCE v1.8

HPE-3PAR SSMC 3.2


HPE-3PAR StoreServ Management Console (SSMC) 3.2 running on Windows 2012 R2, Windows 2016, RHEL7.3, or hpelinux (Debian 8) in a Java 1.8 JVM with BouncyCastle JCE provider v156 on any Intel E5 family CPU.

    • Intel Xeon E5 Family w/ Windows 2012
    • Intel Xeon E5 Family w/ Windows 2016
    • Intel Xeon E5 Family w/ hpelinux (Debian 8)
    • Intel Xeon E5 Family w/ RHEL 7.3
8/11/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3852
1245Trend Micro Inc.
11305 Alterra Parkway
Austin, TX 78758
USA

Paul Tucker
paul_tucker@trendmicro.com
512-633-7945

TippingPoint Crypto Core OpenSSL

2.0.13


The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

    • Intel Core i3 without PAA w/ Linux 4.4
    • Intel Xeon with PAA w/ Linux 4.4
    • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
8/11/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3850, DRBG #1601
1244SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
(844) 436-2797

CryptoComply Java Engine

3.0.1


CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

    • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
8/11/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512, SHA-512/256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3849, DRBG #1600
1243LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Jongseong Kim
jongseong.kim@lge.com
82-10-4535-0110
Fax: 82-2-6950-2080

LG BoringSSL

2.0


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

    • Snapdragon 835 (MSM8998) w/ Android 7.1.2
8/11/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3841, DRBG #1592
1242NetBrain Technologies, Inc
15 Network Drive 2nd Floor
Burlington, Massachusetts 01803
United States

Michael Passanisi
Michael.Passanisi@netbraintech.com
781-221-7199 (x2055)
Fax: +1 (781) 998-5800

Boyang Zhang
boyang.zhang@netbraintech.com
781-221-7199 (x2059)

NetBrain OpenSSL Cryptographic Module

1.0


The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

    • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
8/11/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3840, DRBG #1591
1241Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6250

CiscoSSL FIPS Object Module

6.0 (Firmware)


The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Intel Xeon on VMware ESXi 5.5
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3831, DRBG #1583
1240Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6250

CiscoSSL FIPS Object Module

6.0 (Firmware)


The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Intel Xeon
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3830, DRBG #1581
1239ForeScout
190 West Tasman Drive
San Jose, CA 95134
USA

Ayelet Kutner
cavp@forescout.com

BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

    • Intel Celeron J1900 w/ CentOS 6.6
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3827, DRBG #1580
1238Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

OpenSSL (no AVX2, x86_64, 32-bit library)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3824, DRBG #1579
1237Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

OpenSSL (no AVX2, x86_64, 64-bit library)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3823, DRBG #1578
1236RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

Rohit Mathur
rohit.mathur@rsa.com
+61730325220

RSA BSAFE Crypto-C Micro Edition

4.1.3.2


RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

    • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3822, DRBG #1577
1235Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

OpenSSL (Full CPU set, x86_64, 32-bit library)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3821, DRBG #1576
1234Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

GnuTLS_x86_64_C

5.0


GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

    • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3818, DRBG #1575
1233Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

GnuTLS_x86_C

5.0


GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

    • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-384
        • L = 2048, N = 256 SHA: SHA-384
        • L = 3072, N = 256 SHA: SHA-384
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3817, DRBG #1574
1232Nokia
600 March Rd
Ottawa, Ontario K2K 2E6
Canada

Hooman Bidgoli
hooman.bidgoli@nokia.com
+1 613 784 5351

Peter Merriman
peter.merriman@nokia.com
+1 613 784 3045

Nokia 7705 SAR OS Non Datapath Cryptographic Library

2 (Firmware)


The Nokia 7705 SAR OS Non Datapath Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

    • Cavium Octeon Plus
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3816, DRBG #1573
1231Nokia
600 March Rd
Ottawa, Ontario K2K 2E6
Canada

Hooman Bidgoli
hooman.bidgoli@nokia.com
+1 613 784 5351

Peter Merriman
peter.merriman@nokia.com
+1 613 784 3045

Nokia 7705 SAR OS Cryptographic Library

2 (Firmware)


The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

    • Cavium Octeon Plus
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3815, DRBG #1572
1230Nokia
600 March Rd.
Ottawa, Ontario k0A 2Z0
Canada

Hooman Bidgoli
hooman.bidgoli@nokia.com
+1 613 784 5351

Peter Merriman
peter.merriman@nokia.com
+1 613 784 3045

Nokia 7705 SAR OS Cryptographic Library

2 (Firmware)


The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

    • Cavium Octeon II
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3814, DRBG #1571
1229Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Linda Gallops
linda.gallops@oracle.com
+1 704.972.5018
Fax: +1 980.355.5399

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 NSS without AES-NI

R7-2.0.0


Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/4/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3808, DRBG #1568
1228Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

OpenSSL (Full CPU set, x86_64, 64-bit library)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3807, DRBG #1567
1227Trusted Concepts
205 Van Buren St
Suite 440
Herndon, VA 20170
USA

Chris Greenlee
chris.greenlee@trustedconcepts.com
202.680.3718

TrustedKeep Encryption Module

1.8.3


TrustedKeep is a secure object storage and sharing solution.

    • Intel Core i7 w/PAA w/ CentOS 7.3
    • Intel Core i7 w/o PAA w/ CentOS 7.3
8/4/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3801, DRBG #1563
1226Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49-D100-QuickSec

15.1X49-D100 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
8/4/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3798, DRBG #1560
1225Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49-D100-OpenSSL

15.1X49-D100 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
8/4/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3795, DRBG #1559
1224Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Petra Manche
+44 1189 245470

Chris Brych
+1 613.216.3078

Oracle ILOM OpenSSL FIPS Object Module

2.0.10


Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 1402 as a software module, multichip standalone module embodiment.

    • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
    • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
    • Oracle ILOM SP V4 (ARM V5) without PAA w/ Oracle ILOM OS v3.0
7/28/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3793, DRBG #1557
1223Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

10.0.15063


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
7/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3790, DRBG #1555
1222Hewlett-Packard Development Company, L.P.
11445 Compaq Center Drive W
Houston, TX 77070
USA

Timothy McDonough
timothy.mcdonough@hpe.com

Hewlett Packard Enterprise SSL Crypto Module Engine

2.1


Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

    • ARM i.MX6 w/ Yocto Linux 3.0.35
7/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3790, DRBG #1554
1221SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

3.0


This test covers assembler implementation of AES, SHA and GHASH.

    • z13 w/ SUSE Linux Enterprise Server 12 SP2
7/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3788, DRBG #1552
1220SUSE, LLC
10 Canal Park, Suite 200
Cambridge, MA 02141
USA

Andreas Stieger
astieger@suse.com
+49 911 74053 384

Thomas Biege
thomas@suse.de
+49 911 74053 500

SUSE OpenSSL using SHA assembler

3.0


This test covers generic assembler implementation of SHA.

    • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
7/14/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3771, DRBG #1539
1219Forcepoint LLC
10900-A Stonelake Blvd
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (3305)

2.0


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
7/14/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3767, DRBG #1534
1218Forcepoint LLC
10900-A Stonelake Blvd
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (2105)

2.0


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
7/14/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3766, DRBG #1533
1217Forcepoint LLC
10900-A Stonelake Blvd
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (325)

2.0


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
7/14/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3765, DRBG #1532
1216IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services ICSF PKCS #11

OA52336


ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

    • IBM z13 w/ IBM z/OS(R) v2.2
7/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3761, DRBG #1530
1215Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

Libgcrypt (C implementations) Intel x86 32 bit

5.0


Libgcrypt (C implementations) Intel x86 64 bit

    • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
7/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3757, DRBG #1528
1214Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
jreznik@redhat.com

Libgcrypt (C implementations) Intel x86 64 bit

5.0


Libgcrypt (C implementations) Intel x86 64 bit

    • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
7/8/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3756, DRBG #1527
1213Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Kelvin Desplanque
kdesplan@cisco.com
6137887216

CiscoSSL FIPS Object Module

6.0 (Firmware)


The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Intel Xeon
6/23/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3739, DRBG #1509
1211GE MDS, LLC
175 Science Parkway
Rochester, NY 14620
USA

Aaron Wright
aaron.wright@ge.com
585-242-8354
Fax: 585-241-5590

Alex Charissis
alex.charissis@ge.com
585-242-8402
Fax: 585-241-5590

Mocana DSF

5.5 (Firmware)


Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

    • Freescale IMX 6 (ARM)
6/16/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3721, DRBG #1497
1210GE MDS, LLC
175 Science Parkway
Rochester, NY 14620
USA

Aaron Wright
aaron.wright@ge.com
585-242-8354
Fax: 585-241-5590

Alex Charissis
alex.charissis@ge.com
585-242-8402
Fax: 585-241-5590

OpenSSL

Fips-2.0.12 (Firmware)


Open source Secure Sockets Layer cryptographic API and associated self-test routines.

    • Freescale IMX 6 (ARM)
6/16/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3720, DRBG #1496
1209Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Linda Gallops
linda.gallops@oracle.com
+1 704.972.5018
Fax: +1 980.355.5399

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/16/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3719, DRBG #1495
1208Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Linda Gallops
linda.gallops@oracle.com
+1 704.972.5018
Fax: +1 980.355.5399

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
6/16/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3718, DRBG #1494
1207Palo Alto Networks
4301 Great America Parkway
Santa Clara, California 95054
USA

Richard Bishop
rbishop@paloaltonetworks.com
408-753-4000

Jake Bajic
jbajic@paloaltonetworks.com
408-753-3901

Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

8.0 (Firmware)


The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

    • Cavium Octeon MIPS64
    • Cavium MIPS64
    • Intel Multi Core Xeon
    • Intel Celeron
    • Intel i7
6/9/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1489
1206Amazon Web Services, Inc.
410 Terry Ave N
Ste 1200
Seattle, WA 98109-5210
USA

Kelvin Yiu
kelvinyi@amazon.com

Ken Beer
nbeer@amazon.com

AWS Key Management Service Cryptographic Algorithm Library

1.0.0 (Firmware)


The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

    • Intel Xeon E5-2640v4
6/9/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3708, DRBG #1487
1205Palo Alto Networks
4301 Great America Parkway
Santa Clara, California 95054
USA

Richard Bishop
rbishop@paloaltonetworks.com
408-753-4000

Jake Bajic
jbajic@paloaltonetworks.com
408-753-3901

Palo Alto Networks Crypto Module (PA VM-series)

8.0


The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

    • Intel Multi Core Xeon w/ VMware ESXi 5.5
    • Intel Multi Core Xeon w/ Centos 7.2 - KVM
    • Intel Multi Core Xeon w/ Hyper-V 2012 r2
    • Intel Multi Core Xeon w/ AWS EC2
    • Intel Multi Core Xeon w/ Azure
6/2/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1486
1204Hewlett Packard Enterprise Company
3000 Hanover Street
Palo Alto, CA 94304
USA

Luis Luciani
luis.luciani@hpe.com
281-518-6762

Edward Newman
edward.newman@hpe.com
281-514-2713

iLO SSL Firmware Crypto Library

iLO 5 v1.11 (Firmware)


HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

    • Cortex A9
6/2/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3706, DRBG #1485
1203Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

Jordan Saxonberg
jordan_saxonberg@symantec.com
424-750-7052
Fax: 424-750-8107

Symantec SymSSLf Cryptographic Module

Intel Xeon 1.0.1


Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

    • Intel Xeon with AES-NI w/ Windows 7 SP1
5/19/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3704, DRBG #1477
1202Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

Jordan Saxonberg
jordan_saxonberg@symantec.com
424-750-7052
Fax: 424-750-8107

Symantec SymSSLf Cryptographic Module

Intel Xeon 1.0.1


Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

    • Intel Xeon without AES-NI w/ Windows 7 SP1
5/19/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3703, DRBG #1476
1201Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Mark Hanson
mark.hanson@intel.com
972.963.7326

McAfee OpenSSL FIPS Object Module

1.0.0


The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

    • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
5/19/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3699, DRBG #1474
1200Cog Systems / HTC
Level 1
277 King Street
Newton
Sydney, NSW 2042
Australia

Daniel Potts
danielp@cog.systems
+1 855 662 7234

D4Secure Boring/OpenSSL FIPS Module

FIPS Module 2.0.14


The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

    • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
5/5/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3686, DRBG #1456
1199Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

FX-OS

2.0 (Firmware)


Cisco Firepower eXtensible Operating System (FX-OS) version 2.0, a next-generation network and content security solutions.

    • Intel Xeon E3-11XX
4/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3546, DRBG #1368
1198Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Kevin Meagher
KMeagher@ciena.com

Ciena 8700 Packetwave Platform

8.5


The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch.

    • NXP QorIQ P4080 w/ SAOS 8.5
4/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3682, DRBG #1454
1197Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

FMC FOM

6.0 (Firmware)


A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

    • Intel Atom
    • Intel Pentium
    • Intel Xeon
4/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3512, DRBG #1337
1196Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

FMC FOM Virtual

6.0


A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

    • Intel Xeon E-Series w/ ESXi 5.5
4/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3637, DRBG #1425
1195OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD 21710
USA

Steve Marquess
marquess@veridicalsystems.com
301-874-2571

OpenSSL FIPS Object Module

2.0.16


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.18
    • Intel Atom C2558 (x86) with AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
    • Intel Atom C2558 (x86) without AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
    • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
    • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
    • NXP T2080 (PPC) w/ Linux 3.12
4/21/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3681, DRBG #1451
1194Silver Spring Networks
230 W Tasman Drive
San Jose, CA 95134
USA

Jeff Ebert
jebert@ssni.com
16697704000
Fax: 18667760015

Silver Spring Networks Endpoint Security Module

130-0117-01.ESM 82136+98519 (Firmware)


Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

    • ESM instruction manager processor embedded in SSN ARNIE SoC
4/14/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3677, DRBG #1448
1193Klas Telecom
1101 30th Street NW, Suite 500
Washington, DC 20007
USA

Cathal Daly
Cathal.daly@klastelecom.com
0035315250008

Frank Murray
Frank.murray@klastelecom.com

Klas OpenSSL FIPS Object Module 2.0.9

2.0.9


Algorithms taken from OpenSSL FIPS Module v2.0.9

    • Marvell Armv5te Feroceon rev 0 (v5l) w/ Linux 2.6.31.8 (32 bit)
4/14/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3400, DRBG #1250
1192Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Nick Goble
ngoble@cisco.com
703.484.7032

CiscoSSL FIPS Object Module

4.1


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

    • Intel Xeon w/ ADE-OS 2.4
4/7/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3672, DRBG #1446
1191Persistent Systems LLC
303 Fifth Ave
Suite 207
New York, NY 10016
USA

Helson Maria
hmaria@persistentsystems.com
212-561-5895

Dr. David Holmer
dholmer@persistentsystems.com
212-561-5895

Wave Relay® Cryptographic Library

2.0 (Firmware)


The Wave Relay® Mobile Ad Hoc Network (MANET) is a peer-to-peer wireless networking solution that allows a distributed group of mobile users to communicate continuously without fixed infrastructure. The Wave Relay® Cryptographic Library provides module integrity assurance and management security.

    • NXP i.MX 6
4/7/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3667, DRBG #1443
1190Aruba, a Hewlett Packard Enterprise company
1344 Crossman Avenue
Sunnyvale, CA 94089
USA

Steve Weingart
fips@arubanetworks.com
512-319-2480
Fax: 408-227-4500

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Broadcom BCM53014
3/31/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2630, DRBG #660
1189Samsung Electronics Co., Ltd,
416 Maetan-3dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.1


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos8895 w/ Android 7.0
    • Qualcomm MSM8998 w/ Android 7.0
    • Samsung Electronics Exynos7570 w/ Android 7.0
    • Qualcomm MSM8917 w/ Android 7.0
    • Qualcomm MSM8996 w/ Android 7.0
    • Samsung Electronics Exynos8890 w/ Android 7.0
    • Samsung Electronics Exynos7420 w/ Android 7.0
    • Samsung Electronics Exynos7870 w/ Android 7.1
3/31/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3650, DRBG #1431
1188Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Gokul Karthik Balaswamy
gokulk@microsoft.com
425-706-8583
Fax: 425-708-0107

Christine Ahonen
chrisah@microsoft.com
425-706-8675
Fax: 425-936-7329

Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

7.00.2872


The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

    • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
    • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
    • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
    • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
    • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
3/31/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #3649
1187Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Gokul Karthik Balaswamy
gokulk@microsoft.com
425-706-8583
Fax: 425-708-0107

Christine Ahonen
chrisah@microsoft.com
425-706-8675
Fax: 425-936-7329

Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

8.00.6246


The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

    • Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
    • MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
3/24/2017
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #3648
1186IBM Corporation
222 South Riverside Plaza
Ste 1700
Chicago, IL 60606
USA

Mark Seaborn
mseaborn@us.ibm.com
+1 312 423 6640x2354

Jasopn Resch
jresch@us.ibm.com

Cleversafe FIPS Cryptographic Module

1.1


The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

    • Intel Xeon without AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
    • Intel Xeon with AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
3/24/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3640, DRBG #1428
1185Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0 (Firmware)


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
    • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
3/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3638, DRBG #1426
1184Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6520

CiscoSSL FOM

6.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Apple A8 w/ iOS 9.3
3/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3470, DRBG #1316
1183NXP Semiconductors
6501 William Cannon Drive West
Austin, TX 78735
USA

Geoffrey Waters
geoffrey.waters@nxp.com
512-895-2069

Tom Tkacik
tom.tkacik@nxp.com
480-814-3299

DMPR 40301443

CAVP_DMPR_40301443 (Firmware)


NXP's DMPR 40301443 is included in multiple QorIQ and Layerscape processors including: LS1023A, LS1026A, LS1043A, LS1046A, LS1048A, and LS1088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

    • Cadence IES 15.10.009 Verilog simulator
3/6/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2110, DRBG #349
1182NXP Semiconductors
6501 William Cannon Drive West
Austin, TX 78735
USA

Geoffrey Waters
geoffrey.waters@nxp.com
512-895-2069

Tom Tkacik
tom.tkacik@nxp.com
480-814-3299

DMPR 40251443

CAVP_DMPR_40251443 (Firmware)


NXP's DMPR 40251443 is included in multiple QorIQ and Layerscape processors including: LS1012A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

    • Cadence IES 15.10.009 Verilog simulator
3/6/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2110, DRBG #349
1181NXP Semiconductors
6501 William Cannon Drive West
Austin, TX 78735
USA

Geoffrey Waters
geoffrey.waters@nxp.com
512-895-2069

Tom Tkacik
tom.tkacik@nxp.com
480-814-3299

DMPR 40241443

CAVP_DMPR_40241443 (Firmware)


NXP's DMPR 40241443 is included in multiple QorIQ and Layerscape processors including: T1013, T1014, T1023 and T1024. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

    • Cadence IES 15.10.009 Verilog simulator
3/6/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3187, DRBG #1101
1180NXP Semiconductors
6501 William Cannon Drive West
Austin, TX 78735
USA

Geoffrey Waters
geoffrey.waters@nxp.com
512-895-2069

Tom Tkacik
tom.tkacik@nxp.com
480-814-3299

DMPR 40303443

CAVP_DMPR_40303443 (Firmware)


NXP's DMPR 40303443 is included in multiple QorIQ and Layerscape processors including: LS2044A, LS2045A, LS2048A, LS2084A, LS2085A and LS2088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

    • Cadence IES 15.10.009 Verilog simulator
3/6/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2110, DRBG #349
1179NXP Semiconductors
6501 William Cannon Drive West
Austin, TX 78735
USA

Geoffrey Waters
geoffrey.waters@nxp.com
512-895-2069

Tom Tkacik
tom.tkacik@nxp.com
480-814-3299

DMPR 31231342

CAVP_DMPR_31231342 (Firmware)


NXP's DMPR 31231342 is included in multiple QorIQ and Layerscape processors including: LS1020A, LS1021A and LS1022A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

    • Cadence IES 15.10.009 Verilog simulator
3/6/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2110, DRBG #349
1178Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

CiscoSSL FIPS Object Module

6.0 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Cavium CN52xx
    • Intel Xeon X5650
    • Intel Xeon E5-2609 v3
    • Intel Xeon E5-2680 v3
    • Marvell A390
3/6/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3635, DRBG #1422
1177Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
1 919 392 6520

CiscoSSL FIPS Object Module

11.7


tbd

    • Snapdragon 820 w/ Android version 6
2/28/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3478, DRBG #1320
1176Forcepoint LLC
10900-A Stonelake Blvd
Ste. 350
Austin, TX 78759
USA

Matt Sturm
msturm@forcepoint.com
858-320-9444

Matthew Noland
matthew.noland@forcepoint.com
512-644-1214

Forcepoint C Cryptographic Module

2.0.5


Forcepoint produces a family of web, e-mail and data security solutions that can be deployed on pre-configured, security hardened hardware or as customer installable software. The Forcepoint C Crypto Module provides support for cryptographic and secure communications services for these solutions.

    • Forcepoint V10000 G4 Appliance on Intel Xeon E5-2620v3 w/ CentOS 7.2
2/28/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3628, DRBG #1419
1175HUAWEI TECHNOLOGIES Co., Ltd.
Yuhuatai District
101 Software Avenue
NANJING, JIANGSU 210000
CHINA

Yang Ze
yangze1@huawei.com
8615919432118

Liu Pinping
liupinping@huawei.com
8615850529039

Huawei FIPS Cryptographic Library (HFCL) for Switches

V300R003C22SPC805 (Firmware)


Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

    • Cavium CN5020
    • BROADCOM 56340/56342
    • MARVELL 98DX3333/98DX3336
    • FREESCALE P2041
    • FREESCALE SC411231C
    • MARVELL 98DX3245/98DX3246/98DX3247
2/28/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3627, DRBG #1418
1174Citrix Systems, Inc.
851 Cypress Creek Road
Fort Lauderdale, FL 33309
USA

Ben Tucker
Ben.Tucker@citrix.com
954-267-3094

Jonathan Andersen
Jonathan.Andersen@citrix.com
954-940-7737

Citrix FIPS Cryptographic Module - DSA

1.0


Citrix FIPS Cryptographic Module provides cryptographic services for various Citrix products.

    • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ iOS 10 64-bit
    • ARM v7-A with NEON extensions w/ Android 5
    • Intel Core i7 [4th Generation] with AES-NI w/ Windows 10 32-bit
    • ARM v7-A with NEON extensions w/ Android 6
    • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 6
    • Intel Core i7 [6th Generation] with AES-NI w/ Windows 10 64-bit
    • ARM v8-A w/ Windows 10 Mobile 32-bit
    • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under XenServer 6, 64-bit
    • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under ESXi 5, 64-bit
    • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under Hyper-V on Windows Server 2012 R2, 64-bit
    • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 32-bit
    • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 64-bit
    • Intel Core i7 [6th Generation] with AES-NI w/ Linux 3.13 64-bit
    • ARM v7-A with NEON extensions w/ Android 4.4
    • ARM v7-A with NEON extensions w/ Android 7
    • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 7
    • Intel Core i7 with AES-NI w/ Mac OS X 10.12 64-bit
    • ARM v8-A with NEON extensions w/ ViewSonic Thin OS
    • Intel Xeon E55xx Series w/ Linux 3.13 under XenServer 6
2/28/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3626, DRBG #1417
1173Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49- OpenSSL

15.1X49-D75 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Intel Xeon (C5518)
2/10/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
1172Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS FIPS Version 15.1X49- Authentec

Broadcom XLP832 15.1X49-D75 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Broadcom XLP832
2/10/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3621, DRBG #1415
1171Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - Authentec_XLP

15.1 X49-D60 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Broadcom XLP832
2/10/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3588, DRBG #1400
1170OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD 21710
USA

Steve Marquess
info@openssl.com
301-874-2571

OpenSSL FIPS Object Module

2.0.15


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • TI c64 w/ SurfWare 7.2
2/10/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3620, DRBG #1414
1169Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

Brian Wood
be.wood@samsung.com
+1-973-440-9125

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung SCrypto Library

2.0


Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

    • Samsung Electronics Exynos8895 w/ Kinibi 400A (32-bit)
    • Qualcomm MSM8998 w/ QSEE 4.0 (32-bit)
    • Qualcomm MSM8998 w/ QSEE 4.0 (64-bit)
    • Samsung Electronics Exynos7870 w/ Kinibi 310 (32-bit)
2/10/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3618, DRBG #1412
1167Aruba, a Hewlett Packard Enterprise company
1344 Crossman Avenue
Sunnyvale, CA 94089
USA

Steve Weingart
fips@arubanetworks.com
512-319-2480
Fax: 408-227-4500

ArubaOS Crypto Module

6.5.1-FIPS (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm Atheros QCA9344
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #2246, DRBG #433
1166Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - Authentec_CN7130

15.1 X49-D60 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN7130
1/27/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3582, DRBG #1398
1165Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - Authentec_CN7020

15.1 X49-D60 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN7020
1/27/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3582, DRBG #1398
1164Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - Authentec_CN6335

15.1 X49-D60 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN6335
1/27/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3582, DRBG #1398
1163Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - OpenSSL

15.1X49-D60


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN7020
    • CN7130
    • CN6335
1/27/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3600, DRBG #1398
1162Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using SHA assembler

1.0


The test covers assembler of SHA for OpenSSL.

    • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3599, DRBG #1397
1161Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using SSSE3 for SHA

1.0


The test covers the SHA using SSSE3 for OpenSSL.

    • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3598, DRBG #1396
1160Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using AVX2 for SHA

1.0


The test covers SHA using AVX2 for OpenSSL

    • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3597, DRBG #1395
1159Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using AES, SHA, GHASH and multiplication from CPACF

1.0


The test covers the AES, SHA, GHASH and multiplication from CPACF for OpenSSL.

    • z13 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3596, DRBG #1393
1158Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using AES, SHA, GHASH and multiplication assemblers

1.0


The test covers the assembler implementation of AES, SHA, GHASH and multiplication.

    • z13 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3595, DRBG #1392
1157Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using support from Power ISA 2.07 for AES and SHA

1.0


The test covers the using support from Power ISA 2.07 for AES and SHA for OpenSSL.

    • Power8 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3594, DRBG #1391
1156Canonical Ltd.
5th Floor, Blue Fin Building, 110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten
joy.latten@canonical.com

Andrew Cloke
andrew.cloke@canonical.com

OpenSSL using assembler for AES and SHA

1.0


The test covers the assembler implementation of AES and SHA

    • Power8 w/ Ubuntu 16.04
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3593, DRBG #1390
1155Getac Technology Corporation
5F., Building A, No. 209, Sec. 1, Nangang Rd., Nangang Dist.
Taipei City 11568
Taiwan

Yu-Shian Chen
yushian.chen@getac.com.tw
+886-2-27857888 Ext. 5675
Fax: +886-2-27865656

Jeff Lin
jeff.cflin@getac.com
+886-2-27857888 Ext. 5346
Fax: +886-2-27865656

Getac OpenSSL Cryptographic Library

1.0.1k


Getac OpenSSL Cryptographic Library provides a variety of cryptographic services via OpenSSL FIPS module for Getac products.

    • Intel Atom w/ Android 5.1.1
1/27/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3590, DRBG #1389
1154Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version Junos 15.1 X49 - SRX 5k - OpenSSL

15.1 X49-D60 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Intel Xeon C5518
1/19/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3587, DRBG #1388
1153Oceus Networks, Inc.
1895 Preston White Drive
Suite 300
Reston, Virginia 20191
USA

Sharman Palos
spalos@oceusnetworks.com
214-778-6360
Fax: 214-778-6341

Chris Hill
chill@oceusnetworks.com
214-778-6386
Fax: 214-778-6341

Oceus Networks VPN Client

2.0


Oceus Networks, Inc., a trusted CSfC Integrator, has built the Oceus Networks VPN (Oceus VPN Client) as a complete, full-featured solution that allows Android OEMs to easily integrate VPN functionality into mobile devices that need to establish encrypted tunnels of communication.

    • Exynos 7420 w/ Android 6.0
    • Qualcomm MSM8996 w/ Android 6.0
1/19/2017
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2313, DRBG #460
1152Pulse Secure LLC
2700 Zanker Road Suite 200
San Jose, CA 95134
USA

Vikki Yin Wei
vwei@pulsesecure.net
+1-844-807-8573
Fax: +1-408-503-7452

Yvonne Sang
ysang@pulsesecure.net
+1-844-807-8573
Fax: +1-408-503-7452

Pulse Secure Cryptographic Module DSA

2.0


The Pulse Secure Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies.

    • MAG2600 Intel Atom, N270, 1.6GHz w/ IVE OS 2.0 (32-bit)
    • MAG4610, SM160 Intel Core 2 Duo E2160 1.8Ghz w/ IVE OS 2.0 (64-bit)
    • MAG6610, SM360 Intel Core-2 Quad Q9400 2.66GHz w/ IVE OS 2.0 (64-bit)
    • PSA300, PSA3000 Intel Celeron Processor J1900 2.42 GHz w/ IVE OS 2.0 (64-bit)
    • PSA5000 Intel PENTIUM G3420 2C/2T 3.2G w/ IVE OS 2.0 (64-bit)
    • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ IVE OS 2.0 (64-bit)
    • Dell Power Edge R430/R530, Intel Xeon E5-2620 v4 2.1GHz w/ IVE OS 2.0 (64-bit)
    • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ Pulse One version 2.0 (64-bit)
1/13/2017
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
        • L = 2048, N = 224 SHA: SHA-224
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3577, DRBG #1384
1151LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Jongseong Kim
jongseong.kim@lge.com
82-10-4535-0110
Fax: 82-2-6950-2080

LG BoringSSL

1.0


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

    • Snapdragon 821 (8996 Pro) w/ Android 7.0
1/13/2017
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3572, DRBG #1381
1150Dell, Inc
5450 Great America Parkway
Santa Clara, CA 95054
US

Srihari Mandava
srihari_mandava@dell.com

Dell OpenSSL Cryptographic Library

2.4


Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features.

    • Broadcom XLP w/ Dell Networking Operating System 9.11(0.0)
    • ARM Cortex A9 w/ Dell Networking Operating System 9.11(0.0)
    • FreeScale PowerPC e500 w/ Dell Networking Operating System 9.11(0.0)
    • Intel Atom S1000 w/ Dell Networking Operating System 9.11(0.0)
    • Intel Atom C2000 w/ Dell Networking Operating System 9.11(0.0)
12/23/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3556, DRBG #1376
1149Fatpipe, Inc.
4455 S 700 E STE 100
Salt Lake City, UT 84107
USA

Matt Gwyther
mattg@fatpipeinc.com
801-281-3434
Fax: 801-281-0317

MPVPN

9-1-2-fips


Fatpipe MPVPN®, a patented router clustering device, is an essential part of Disaster Recovery and Business Continuity Planning for Virtual Private Network (VPN) connectivity. It is integrated with several User Space cryptographic algorithms and other security mechanisms.

    • Intel(R) Xeon(R) CPU E3-1220 v5 @ 3.00GHz w/o AES-NI w/ LFS (Linux from scratch) 1.1.0 x86 64 Pure64
12/23/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: DRBG #1372
1148Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Mark Hanson
mark.hanson@intel.com
972.963.7326

McAfee OpenSSL FIPS Object Module

1.0.0


The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

    • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
12/23/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3548, DRBG #1371
1147Certicom Corp.
4701 Tahoe Blvd, Building A, 5th Floor
Missisauga, ON L4W 0B5
Canada

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-508-4230

Security Builder FIPS Core

5.6.2


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based applications for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec, SSL and DRM modules.

    • Qualcomm Snapdragon 801 w/ BlackBerry 10
    • Qualcomm Snapdragon S4 w/ BlackBerry 10
    • Qualcomm Snapdragon S4 Pro w/ BlackBerry 10
12/23/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3547, DRBG #1370
1146Distech Controls, Inc.
4205 Place de Java
Brossard, QC J4Y 0C4
Canada

Dominic Gagnon
dgagnon@distech-controls.com
450-444-9898 Ext.231
Fax: 450-444-0770

François Gervais
fgervais@distech-controls.com
450-444-9898 Ext.263
Fax: 450-444-0770

Distech Java Cryptographic Library

1.0 (Firmware)


The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

    • AM335x Cortex-A8 (ARMv7) /w NEON
12/23/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3545, DRBG #1367
1145Hewlett Packard Enterprise
8000 Foothills Blvd
Roseville, CA 95747
USA

Susan Scotten
susan.scotten@hpe.com
916-785-8742

Aruba 2920 switch

WB.16.02.0015 (Firmware)


Aruba 2920 switch

    • TriCore ARM11 processor
12/23/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #3544
1144Hewlett Packard Enterprise
8000 Foothills Blvd
Roseville, CA 95747
USA

Susan Scotten
susan.scotten@hpe.com
916-785-8742

Aruba 5400r switch

KB.16.02.0015 (Firmware)


Aruba 5400r switch

    • P2020
12/23/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #3543
1143Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.0


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • NXP ARM Cortex-A9 w/ Android OS API Level 17
12/23/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3538
1142Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.0


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
12/23/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3537
1141Arista Networks Inc.
5453 Great America Pkwy
Santa Clara, CA 95054
USA

Richard Whitney
rw@arista.com
703-627-6092
Fax: 408-538-8920

Arista EOS Crypto Module

v1.0


The Arista EOS Crypto Module library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner.

    • AMD Athlon NEO X2 w/ EOS v4
    • Intel Sandy Bridge EN w/ EOS v4
    • Intel Broadwell-DE w/ EOS v4
    • AMD G Series: eKabini w/ EOS v4
    • AMD G Series: Steppe Eagle w/ EOS v4
12/23/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3516, DRBG #1340
1140Mocana Corporation
20 California Street
San Francisco, CA 94111
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.4.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com

    • Intel Atom E3800 w/ Wind River Linux 6.0
12/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3511, DRBG #1336
1139VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
12/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3490, DRBG #1330
1138DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

Kylie Gallagher
kylie_gallagher@dell.com
+1 512 723 7550

Gang Liu
gang_liu@dell.com
+1 512 728 5545

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • PowerPC 440EPX w/ Linux 3.2.18
    • Renesas SH7758 w/ Linux 3.4.11
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3485, DRBG #1327
1137Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Chris Marks
marksc@brocade.com
408-333-0480

Brocade FIPS Crypto Library

FOS 8.1.0 (Firmware)


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • MPC8548
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3484, DRBG #1326
1136Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Chris Marks
marksc@brocade.com
408-333-0480

Brocade FIPS Crypto Library

FOS 8.1.0 (Firmware)


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • PPC440EPX
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3483, DRBG #1325
1134Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Chris Marks
marksc@brocade.com
408-333-0480

Brocade FIPS Crypto Library

FOS 8.1.0 (Firmware)


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • T1022
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3481, DRBG #1323
1133Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Chris Marks
marksc@brocade.com
408-333-0480

Brocade FIPS Crypto Library

FOS 8.1.0 (Firmware)


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • P4080
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3480, DRBG #1322
1132Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Chris Marks
marksc@brocade.com
408-333-0480

Brocade FIPS Crypto Library

FOS 8.1.0 (Firmware)


Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

    • P3041
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3479, DRBG #1321
1131Distech Controls, Inc.
4205 Place de Java
Brossard, QC J4Y 0C4
Canada

Dominic Gagnon
dgagnon@distech-controls.com
450-444-9898 Ext.231
Fax: 450-444-0770

François Gervais
fgervais@distech-controls.com
450-444-9898 Ext.263
Fax: 450-444-0770

Distech SSL Cryptographic Library

1.0 (Firmware)


The Distech SSL Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

    • AM335x Cortex-A8 (ARMv7) /w NEON
    • AM335x Cortex-A8 (ARMv7) /without NEON
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3476, DRBG #1318
1130Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

CiscoSSL FIPS Object Module (Assembler)

6.2


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

    • Cavium Octeon MIPS64 w/ Linux 2.6
    • Cavium Octeon MIPS64 w/ Linux 3.10
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3471, DRBG #1317
1129Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

CiscoSSL FIPS Object Module

6.2


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

    • ARMv8 w/ Android 3.10
    • ARMv8 w / Apple iOS 9
    • Intel Xeon w/ FreeBSD 10.3
    • Intel Core i5 without AES-Ni w/ Windows 10
    • Intel Core i5 with AES-Ni w/ Windows 10
    • Cavium Octeon MIPS64 w/ Linux 2.6
    • Intel Core i5 without AES-Ni w/ Linux 3.10
    • Intel Core i5 with AES-Ni w/ Linux 3.10
12/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3470, DRBG #1316
1128Hypori, Inc.
9211 Waterford Centre Blvd
Suite 100
Austin, TX 78758
USA

Evan Watkins
evan.watkins@hypori.com
512-646-1040

Hypori FIPS Object Module for OpenSSL

2.0.10


Re-brand of OpenSSL Version 2.0.10 running in Hypori Virtual Device

    • Intel Xeon w/ Android 4 (ARMv7 w/ Houdini) on ESXi 6
    • Intel Xeon w/ Android 4 (x86_64) on ESXi 6
12/2/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3419, DRBG #1262
1127VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
12/2/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3417, DRBG #1261
1126Fatpipe, Inc.
4455 S 700 E STE 100
Salt Lake City, UT 84107
USA

Matt Gwyther
mattg@fatpipeinc.com
(801)281-3434
Fax: (801)281-0317

MPVPN

9-1-2-fips


FatPipe MPVPN®, a patented router clustering device, is an essential part of Disaster Recovery and Business Continuity Planning for Virtual Private Network (VPN) connectivity. It is integrated with several User Space cryptographic algorithms and other security mechanisms.

    • Intel Xeon Quad Core E3-1270v2 @ 3.50GHz w/o AES-NI w/ LFS (Linux from scratch) 1.1.0 x86 64 Pure64
11/18/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: DRBG #1259
1125Barracuda Networks
3175 Winchester Road
Campbell, CA 95008
USA

Andrea Cannon
acannon@barracuda.com
703-743-9068

Barracuda Cryptographic Software Module

1.0.1.8


x

    • Intel Xeon with AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
    • Intel Xeon without AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
11/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3412, DRBG #1258
1124OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD 21710
USA

Steve Marquess
info@openssl.com
301-874-2571

OpenSSL FIPS Object Module

2.0.14


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.1
11/10/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3411, DRBG #1256
1123VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
+1 (650) 427-1902

Manoj Maskara
mmaskara@vmware.com
+1 (650) 427-3478

VMware OpenSSL FIPS Object Module

2.0.9


The VMware OpenSSL FIPS Object Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.

    • Intel Core I without AES-NI w/ Windows 8.1 on ESXi 6.0
    • Intel Core I without AES-NI w/ Windows 7 SP1 on ESXi 6.0
    • Intel Core I with AES-NI w/ Windows 7 SP1 on ESXi 6.0
    • Intel Core I without AES-NI w/ Windows 10 on ESXi 6.0
    • Intel Core I with AES-NI w/ Windows 10 on ESXi 6.0
    • Intel Core I with AES-NI w/ Windows 8.1 on ESXi 6.0
    • Intel Xeon with AES-NI w/ Windows 2012 64 bit on ESXi 6.0
    • Intel Xeon with AES-NI w/ Windows 2012 R2 on ESXi 6.0
    • Intel Xeon without AES-NI w/ Windows 2012 on ESXi 6.0
    • Intel Xeon without AES-NI w/ Windows 2012 R2 on ESXi 6.0
    • Intel Xeon without AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
    • Intel Xeon with AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
    • Intel Xeon without AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
    • Intel Xeon with AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
    • Intel Xeon with AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
    • Intel Xeon without AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
    • Intel Xeon with AES-NI w/ SLES 11 SP3 on ESXi 6.0
    • Intel Xeon without AES-NI w/ SLES 11 SP3 on ESXi 6.0
    • Intel Xeon without AES-NI w/ Windows 2012 64 bit on ESXi 6.0
    • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6
    • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6
    • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.0
    • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.0
    • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.5
    • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.5
    • Intel Xeon with AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
    • Intel Xeon without AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
    • Intel Xeon with AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
    • Intel Xeon without AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
    • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6.5
    • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6.5
    • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.0
    • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.0
    • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.5
    • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.5
    • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
    • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
    • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
    • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
    • Intel Xeon with AES-NI w/ Ubuntu 16.04 64 bit on ESXi 6.0
    • Intel Xeon without AES-NI w/ Windows Server 2008 on ESXi 6.5
    • Intel Xeon without AES-NI w/ BLUX 4.9 on ESXi 6.5
    • Intel Xeon without AES-NI w/ Windows Server 2012 on ESXi 6.5
    • Intel Xeon without AES-NI w/ SLES 12 on ESXi 6.5
    • Intel Xeon without AES-NI w/ Windows 10 on ESXi 6.5
11/4/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3407, DRBG #1254
1122Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Module

1.0 (Firmware)


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI, Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.4GHz with AES-NI
10/28/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3403, DRBG #1251
1121RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

Rohit Mathur
rohit.mathur@rsa.com
+61 7 3032 5220

RSA BSAFE Crypto-C Micro Edition (ME)

4.0.2.5


RSA BSAFE(R) Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

    • Intel x86 w/ NetBSD v6.0.1
10/21/2016
  • DSA:
    • 186-4:
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1
      • Prerequisite: SHS #3395, DRBG #1246
1120IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
jmonti@us.ibm.com

IBM z/OS(R) Cryptographic Services System SSL - 64bit with CPACF for SHA

OA50589


z/OS(R) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • IBM z13 w/ IBM z/OS(R) v2.1
10/21/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • Prerequisite: SHS #3196
1119IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
jmonti@us.ibm.com

IBM z/OS(R) Cryptographic Services System SSL - 31bit with CPACF for SHA

OA50589


z/OS(R) System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • IBM z13 w/ IBM z/OS(R) v2.1
10/21/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • Prerequisite: SHS #3196
1118LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Jongseong Kim
jongseong.kim@lge.com
82-10-4535-0110
Fax: 82-2-6950-2080

LG OpenSSL FIPS Object Module

2.0.12


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library.

    • Qualcomm Snapdragon 800-series w/ Android 7.0
10/21/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3394, DRBG #1245
1117Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

Thomas Anderson
Thomas_anderson@symantec.com
415-738-2725

David Laliberte
David_laliberte@symantec.com
415-829-5120

Scanner Cipher Engine

2.0


The Symantec Scanner Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec Scanner Cryptographic Module. This module supports Symantec applications by providing validated and approved cryptographic services

    • Intel Xeon w/ CentOS 6
10/14/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3393, DRBG #1244
1116Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Alan Presser
apresser@allegrosoft.com
(978) 264-6600

Allegro Cryptographic Engine

6.2


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel Core i7 without AES-NI w/ Windows 10 Professional
    • Intel Core i7 with AES-NI w/ Windows 10 Professional
    • Intel Core i7 without AES-NI w/ Linux Mint 18
    • Intel Core i7 with AES-NI w/ Linux Mint 18
10/14/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3390, DRBG #1241
1115Mocana Corporation
20 California Street
San Francisco, CA 94111
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.4.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Freescale P2020 w/ Mentor Graphics Linux 4.0
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3375, DRBG #1232
1114Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-508-467-0284
Fax: 1-978-264-5522

HPE Comware Firmware

Comware Crypto 7.1.1.1.1.55 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

    • ARM Cortex-A9 1GHz
    • Broadcom XLS408, 1.2GHz, MIPS
    • Freescale MPC P5040, 1.8 GHz, PowerPC
    • Freescale MPC8548, 1.5 GHz, PowerPC
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3369, DRBG #1231
1113Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-508-467-0284
Fax: 1-978-264-5522

HPE Comware Firmware

Comware Crypto 7.1.1.1.1.53 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

    • ARM Cortex-A9 1GHz * 2
    • Broadcom XLP108, 1.0GHz, MIPS
    • Broadcom XLP316, 1.2GHz, MIPS
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3368, DRBG #1230
1112Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-508-467-0284
Fax: 1-978-264-5522

HPE Comware Firmware

Comware Crypto 7.1.1.1.1.52 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

    • Cavium CN6130, 1Ghz, MIPS
    • Cavium CN6218, 1Ghz, MIPS
    • Cavium CN6635, 1.3Ghz, MIPS
    • Freescale P1016, 667Mhz, PowerPC
    • Freescale P1021, 800Mhz, PowerPC
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3367, DRBG #1229
1111Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-508-467-0284
Fax: 1-978-264-5522

HPE Comware Firmware

Comware Crypto 7.1.1.1.1.50 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

    • Broadcom XLP108AQ, 1GHz, MIPS
    • Broadcom XLP316, 1.2GHz, MIPS
    • Broadcom XLS208, Cortex-A9, 1GHz
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3366, DRBG #1228
1110Centrify Corporation
3300 Tannery Way
Santa Clara, California 95054
USA

Kitty Shih
kitty.shih@centrify.com
669-444-5238

Centrify Cryptographic Library

2.0


Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

    • PowerPC Power 7 w/ AIX 7.2 (32-bit)
    • MacBook Pro Intel Core i7 w/ Mac OS 10.11.5
    • Intel Xeon x86_64 w/ RHEL 7.2
    • PowerPC Power 7 w/ AIX 7.2 (64-bit)
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3363, DRBG #1226
1109IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services System SSL - 64bit

OA50589


z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • IBM z13 w/ IBM z/OS(R) v2.1
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3362, DRBG #1206
1108IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services System SSL - 31bit

OA50589


z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens.

    • IBM z13 w/ IBM z/OS(R) v2.1
9/16/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3361, DRBG #1206
1107Microwave Networks Inc.
4000 Greenbriar Dr.
Stafford, TX 77477
USA

Ben Lee
BenL@microwavenetworks.com
281-263-6569
Fax: 281-263-6400

Angelos Liveris
AngelosL@microwavenetworks.com
281-263-6701

SW,LIBRARY,MX,FIPS SECURITY FUNCTION (4600314-00A)

0.A (Firmware)


The Security Function Library includes AES, DSA, HMAC, SHA, and SNMP-KDF algorithms for use in the Application Code firmware component of the Microwave Networks Inc cryptographic module.

    • Freescale PowerQUICC MPC875ZT66
9/9/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3360
1106Comtech EF Data Corporation
2114 West 7th Street
Tempe, Arizona 85281
USA

Kasra Akhavan-Toyserkani
kakhavan@comtechefdata.com
(240)243-1837
Fax: (240)243-1853

Parag Patel
ppatel@comtechefdata.com
(240)243-1876
Fax: (240)243-1853

TRANSEC Cryptographic Engine

2.2.4 (Firmware)


The Comtech EF Data FIPS Security Module features an FPGA to perform bulk encryption/decryption for Ethernet data traffic via Comtech Satellite Modems, as well as firmware to provide the cryptographic functions needed to act as a endpoint for TLS management and control traffic.

    • AMCC PowerPC 440EP
9/9/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3359, DRBG #1225
1105Kyocera Corporation
9520 Towne Centre Drive
Suite 200
San Diego, CA 92121
USA

n/a

DuraForce PRO OpenSSL Library

OpenSSL 1.0.2f


DuraForce PRO OpenSSL 1.0.2f

    • Qualcomm MSM8952 w/ Android 6.0.1
9/9/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3358, DRBG #1224
1104Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_XLR

Broadcom XLR 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Broadcom XLR
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3341, DRBG #1399
1103Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_XLP

Broadcom XLP 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Broadcom XLP
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3342, DRBG #1401
1102Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_CN6335

CN 6335 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN 6335
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3342, DRBG #1216
1101Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_CN5645

CN 5645 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN 5645
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3342, DRBG #1216
1100Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_CN5230

CN 5230 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN 5230
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3342, DRBG #1216
1099Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - Authentec_CN5020

CN 5020 12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • CN 5020
9/9/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3342, DRBG #1216
1098Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
FIPS@microsoft.com
800-Microsoft

Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations

10.0.14393


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface 3 w/ Windows 10 Anniversary Update (x64)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro Anniversary Update (x64)
    • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
    • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x86)
    • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro Anniversary Update (x86)
    • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Anniversary Update (x86)
    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Anniversary Update (x64)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Datacenter (x64)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Storage Server 2016 (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
    • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Qualcomm Snapdragon 820 (Kryo) w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
8/24/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • PQGVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3347, DRBG #1217
1097IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

John Monti
jmonti@us.ibm.com
845-435-4164

IBM z/OS(R) Cryptographic Services ICSF PKCS #11

OA50113


ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

    • IBM z13 w/ IBM z/OS(R) v2.1
8/24/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3327, DRBG #1206
1096Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA

Mahesh Bommareddy
mbommareddy@juniper.net
+1 (408) 936-5493

Junos FIPS Version 12.3 X48 - OpenSSL

12.3X48 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Motorola PowerQUIC III
    • Intel Celeron
    • CN 6000 Series (CN 6335)
    • CN 5000 Series (CN5645)
    • Intel Xeon
8/12/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
      • Prerequisite: SHS #3343, DRBG #1216
1095Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel(R) Xeon(R) CPU E5-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
8/12/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3339, DRBG #1213
1094Dell, Inc
5450 Great America Parkway
Santa Clara, CA 95054
US

Srihari Mandava
srihari_mandava@dell.com

Dell OpenSSL Cryptographic Library

2.4


Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features.

    • Intel Atom S1000 w/ Dell Networking Operating System 9.10(0.1)
    • ARM Cortex A9 w/ Dell Networking Operating System 9.10(0.1)
    • Broadcom XLP w/ Dell Networking Operating System 9.10(0.1)
    • FreeScale PowerPC e500 w/ Dell Networking Operating System 9.10(0.1)
    • Intel Atom C2000 w/ Dell Networking Operating System 9.10(0.1)
7/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3332, DRBG #1210
1093Engage Communication, Inc.
9565 Soquel Drive
Suite 201
Aptos, CA 95003
USA

Gian-Carlo Bava
giancarlo@engageinc.com
831 688-1021 ext 106
Fax: N/ A

Shaun Tomaszewski
shaun.tomaszewski@engageinc.com
831 688-1021 ext 104
Fax: N/ A

BlackVault Crypto-OSS

2.0.5 (Firmware)


The Engage Communication BlackVault cryptographic library provides a FIPS 140-2 approved Application Programming Interface (API) to the BlackVault Hardware Security Module (HSM). The library is based on OpenSSL FIPS version 2.0.5.

    • ARM926EJ-S
7/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2327, DRBG #468
1092IBM Corporation
2455 South Road
Poughkeepsie, New York 12601-5400
USA

Michael Zagorski
zagorski@us.ibm.com
845-435-1853

IBM z/OS(R) Cryptographic Services ICSF PKCS #11

OA50113


ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

    • IBM z13 w/ IBM z/OS(R) v2.1
7/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3327, DRBG #1206
1091Utimaco IS GmbH
Germanusstraße 4
Aachen 52080
Germany

Dr. Gesa Ott
hsm@utimaco.com
49 241-1696-200
Fax: 49 241-1696-199

Dieter Bong
hsm@utimaco.com
49 241-1696-200
Fax: 49 241-1696-199

CryptoServer Se2 DSA

Texas Instruments TMS320C6416T dsa1.2.2.1 (Firmware)


DSA Component implements all DSA key sizes to allow flexibility and efficiency.

    • Texas Instruments TMS320C6416T
7/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
1090Information Security Corporation
1011 Lake St. Suite 425
Oak Park, IL 60118
USA

Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

ISC Cryptographic Development Kit (CDK)

8.0


The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

    • AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
    • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
    • Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
7/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3307, DRBG #1192
1089Palo Alto Networks
4301 Great America Parkway
Santa Clara, California 95054
USA

Richard Bishop
rbishop@paloaltonetworks.com
408 753 4000

Jake Bajic
jbajic@paloaltonetworks.com
408 753 3901

Palo Alto Networks Crypto Module (PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 Firewalls, WF-500 and Panorama M-100/M-500)

(PAN-OS, Wildfire) 7.1 / (Panorama) 7.1 (Firmware)


The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 firewalls, WF-500 and Panorama M-100/M-500.

    • Cavium Octeon MIPS64
    • Intel Multi Core Xeon
    • Intel Celeron
    • Intel I7
7/31/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3316, DRBG #1198
1088Palo Alto Networks
4401 Great America Parkway
Santa Clara, California 95054
USA

Richard Bishop
rbishop@paloaltonetworks.com
408 753 4000

Jake Bajic
jbajic@paloaltonetworks.com
408 753 3901

Palo Alto Networks Crypto Module (PA VM-series)

7.1 (PAN-OS)


The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

    • Intel Multi Core Xeon w/ Citrix XenServer 6.1.0
    • Intel Multi Core Xeon w/ VMware ESXi 5.5
    • Intel Multi Core Xeon w/ CentOS 6.5 - KVM
7/31/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3315, DRBG #1197
1087Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.1


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
7/7/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3312, DRBG #1194
1086Nokia
600 March Rd.
Ottawa, Ontario k0A 2Z0
Canada

Carl Rajsic
carl.rajsic@nokia.com
1 613 784 6218

Alfred Nothaft
alfred.nothaft@nokia.com
1 972 477 5087

Nokia 7x50 SR OS Cryptographic Library

2.0 (Firmware)


The Nokia 7x50 SR OS Cryptographic Library is used on the Nokia 7x50 Service Router products.

    • Cavium Octeon
7/7/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3309, DRBG #1193
1085OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD 21710
USA

Steve Marquess
info@openssl.com
301-874-2571

OpenSSL FIPS Object Module

2.0.13


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • Power8 (PPC) w/ AIX 7.1 32-bit
    • Power8 (PPC) w/ AIX 7.1 64-bit
    • Power8 (PPC) with PAA w/ AIX 7.1 32-bit
    • Power8 (PPC) with PAA w/ AIX 7.1 64-bit
    • Power8 (PPC) w/ AIX 7.2 32-bit
    • Power8 (PPC) with PAA w/ AIX 7.2 32-bit
    • Power8 (PPC) w/ AIX 7.2 64-bit
    • Power8 (PPC) with PAA w/ AIX 7.2 64-bit
    • Power7 (PPC) w/ AIX 7.2 32-bit
    • Power7 (PPC) w/ AIX 7.2 64-bit
6/17/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3294, DRBG #1182
1084Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto core

Intel Xeon 2.9.0


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • n/a w/ CentOS Linux 7.0 64 bit with Oracle JRE 1.8.0
6/10/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3292, DRBG #1180
1083Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Module

1.0


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel Core i5 1.4GHz with AES-NI w/ Mac OS X El Capitan 10.11.3
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ CentOS 6.5 on VMware ESXi 6.0.0
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ CentOS 6.5 on CentOS 6.5 - KVM
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Ubuntu 12.04 LTS on VMware ESXi 6.0.0
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows Server 2008 SP2 (32 bit) on CentOS 6.5 - KVM
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Ubuntu 12.04 LTS on CentOS 6.5 - KVM
    • Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz with AES-NI w/ Windows Server 2008 SP2 32-bit on VMware ESXi 6.0.0
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows 7 Professional 64-bit on VMware ESXi 6.0.0
    • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows 7 Professional 64-bit on CentOS 6.5 - KVM
6/10/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3288, DRBG #1176
1082MobileIron
415 East Middlefield Road
Mountain View, CA 94043
USA

Brian Mansfield
bmansfield@mobileiron.com
415-596-4677

MobileIron Mobile@Work client for Android

OpenSSL 1.0.2d,FIPS 2.0.9


"General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography

    • Samsung Galaxy Note 4 - SM-N910A w/ Android 5.1
    • Samsung S4 - SGH-I337 w/ Android 4.4.4
    • Samsung S5 - SM-G900H w/ Android 4.4.2
    • Samsung Galaxy Note 3 - SM-N900 w/ Android 4.4.2
    • Samsung S6 - SM-G920A w/ Android 5.0.2
5/20/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3040, DRBG #950
1081Cohesity, Inc.
451 El Camino Real
Suite 235
Santa Clara, CA 95050
USA

Vivek Agarwal
vivek@cohesity.com
+1 (415) 690-7805

Cohesity OpenSSL FIPS Object Module

1.0.1


The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.12. It is incorporated into the family of Cohesity storage appliances.

    • Intel x86_64 w/ CentOS 7
5/13/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3271, DRBG #1162
1080WatchGuard Technologies, Inc.
505 Fifth Avenue South, Suite 500
Seattle, Washington 98104
USA

Peter Eng
Peter.Eng@watchguard.com
206 613-6608
Fax: 206 613-0888

Firebox Cryptographic Module

11.11.2 (Firmware)


WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users

    • Freescale P1010
    • Freescale P1011
    • Freescale P1020
    • Freescale T1042
    • Freescale T2081
    • Intel Atom C2758
    • Intel Celeron G1820
    • Intel Pentium G3420
    • Intel Xeon E3
    • Intel Xeon E5
5/6/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3266, DRBG #1160
1079Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Balachandra Shanabhag
shanbhag@juniper.net
+91 8061219144

Quicksec - Control Plane

14.2X4-D10 (Firmware)


The MX 3D Universal Edge Routers deliver high performance, reliability, and scale to enable a cost-effective solution. Key features include support for a wide range of L2/L3 VPN services and advanced broadband network gateway functions, along with integrated routing, switching and security services.

    • Intel® Xeon® LC5518
4/29/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: DRBG #1158
1078Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Balachandra Shanabhag
shanbhag@juniper.net
+91 8061219144

OpenSSL Crypto Lib

14.2X4-D10 (Firmware)


The MX 3D Universal Edge Routers deliver high performance, reliability, and scale to enable a cost-effective solution. Key features include support for a wide range of L2/L3 VPN services and advanced broadband network gateway functions, along with integrated routing, switching and security services.

    • Intel® Xeon® LC5518
4/29/2016
  • DSA:
    • 186-4:
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3262, DRBG #1157
1077Microsemi Corporation
One Enterprise
Aliso Viejo, CA 92656
USA

Richard Newell
richard.newell@microsemi.com
+1 (408) 643-6146

Athena™ TeraFire® EXP-F5200B MPU with PKX-5200

1.0 (Firmware)


The Athena™ TeraFire® EXP-F5200B embedded cryptography microprocessor with PKX-5200 firmware provides DPA-resistant acceleration of the standard cryptographic algorithms used in selected Microsemi products such as PolarFire™ FPGAs. The algorithms are made available to the FPGA user via an internal bus interface for use in end applications.

    • Mentor Graphics ModelSim SE v6.1h
4/29/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3258, DRBG #1153
1076Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.0.3


Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules.

    • Intel Core i7-3615QM w/ Mac OS X El Captian 10.11.4
4/22/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3256, DRBG #1151
1075LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Jongseong Kim
jongseong.kim@lge.com
82-10-4535-0110
Fax: 82-2-6950-2080

Adam Wick
503-808-7216
Fax: 503-350-0833

LG OpenSSL

1.0.1h


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library.

    • Qualcomm Snapdragon 800-series w/ Android 6.0.1
4/22/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3255, DRBG #1150
1074Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Joshua Brickman
seceval_us@oracle.com
781-442-0451

Linda Gallops
seceval_us@oracle.com
704-972-5018
Fax: 980-355-5399

Oracle Solaris Userland Cryptographic Framework, ucrypto library

1.3


The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for applications running in user space. It exposes three public interfaces to provide cryptography to any application designed to utilize them.

    • SPARC64 X+ with hardware accelerators w/ Oracle Solaris 11.3
    • SPARC M7 without hardware accelerators w/ Oracle Solaris 11.3
    • SPARC M7 with hardware accelerators w/ Oracle Solaris 11.3
    • SPARC64 X+ without hardware accelerators w/ Oracle Solaris 11.3
    • SPARC T5 without hardware accelerators w/ Oracle Solaris 11.3
    • SPARC T5 with hardware accelerators w/ Oracle Solaris 11.3
    • Intel Xeon without AES-NI w/ Oracle Solaris 11.3
    • Intel Xeon with AES-NI w/ Oracle Solaris 11.3
4/15/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3245, DRBG #1143
1073Hospira Inc.
275 N. Field Drive
Lake Forest, IL 60045
USA

Chaitanya Srinivasamurthy
Chaitanya.srinivasamurthy@pfizer.com
001-224-212-5715
Fax: 001-224-212-7910

Slawomir Ciapala
Slawomir.Ciapala@pfizer.com
001-224-212-5545
Fax: 001-224-212-7910

Hospira CE3.x OpenSSL Cryptographic Module

2.0.9


Hospira OpenSSL FIPS Object Module 2.0.9 is used within various Hospira Infusion Pumps for providing secure communication between Infusion pumps and external server.

    • i.MX53 Arm Cortex-A8 w/ Android 2.3.7
4/8/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3240, DRBG #1139
1072Allied Telesis
27 Nazareth Ave
Christchurch, Canterbury 8024
New Zealand

Andrew Riddell
Andrew.Riddell@alliedtelesis.co.nz
+64 29 377 3777
Fax: +64 3 339 3001

Mofassir Ul Haque
Mofassir.UlHaque@alliedtelesis.co.nz
+64 27 777 1854
Fax: +64 3 339 3001

AW+ OpenSSL FIPS Object Module Version 2.0.10

Openssl-fips-2.0.10 (Firmware)


AW+ OpenSSL FIPS Object Module is a software library which provides cryptographic support for secure communication and protection of information. The cryptographic services provided by the library include Symmetric Encryption and Decryption, Digital Signature, Cryptographic Hashing and Keyed-Hash Message Authentication.

    • Freescale PowerPC P2040
3/31/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3228, DRBG #1133
1071Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.0


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • MSM8996 w/ Android 6.0.1
    • EXYNOS8890 w/ Android 6.0.1
    • EXYNOS7420 w/ Android 6.0.1
    • APQ8084 w/ Android 6.0.1
    • EXYNOS5433 w/ Android 6.0.1
    • EXYNOS3475 w/ Android 6.0.1
    • MSM8916 w/ Android 6.0.1
3/31/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3227, DRBG #1132
1070Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.0


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
3/25/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3226, DRBG #1130
1069Huawei Device(Dongguan) Co., Ltd.
B2-5 of Nanfang Factory
No.2 of Xincheng Rd
Songshan Lake Science & Technology Industrial Zone
Dongguan, Guangdong 523808
China

Tailiang Hong
hongtailiang@huawei.com
86-755-36376922

Blue Lee
blue.li@huawei.com
86-755-28976679

Huawei OpenSSL

OpenSSL 1.0.1h


General purpose cryptographic module available for Android used by Huawei devices. A variety of cryptographic services are provided, including AES, RSA, SHA, HMAC, CMAC, ECDSA, CTR_DRBG, etc.

    • HiSilicon K3V3+ w/ Android 5.0
3/25/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2933, DRBG #909
1068IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on Linux on z Systems with CPACF

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • z13 w/ RHEL Server release 7.2 for IBM z Systems
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3222, DRBG #1125
1067IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on zOS with CPACF

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • z13 w/ z/OS version 2 release 2
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3221, DRBG #1124
1066IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on xLinux with AES-NI

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • Intel Xeon E5 V3 family w/ Red Hat Enterprise Linux Server release 7.1
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3220, DRBG #1123
1065IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on Windows 2012 with AES-NI

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • Intel Xeon E5 V3 family w/ Windows Server 2012 release 2
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3219, DRBG #1122
1064IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on Windows 7

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • Intel Core i7 vPro 4770 w/ Windows 7 64-bit
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3218, DRBG #1121
1063IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on Linux PowerPC with vcipher and vshasigma

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • POWER 8 w/ Red Hat Enterprise Linux Server release 7.1
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3217, DRBG #1120
1062IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
tbenjami@us.ibm.com
512-286-5319
Fax: 512-973-4763

Karthik Ramamoorthy
kramamoo@us.ibm.com
512-286-8135
Fax: 512-973-4763

IBM JCE FIPS Module on AIX PowerPC with vcipher and vshasigma

1.8


The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.

    • POWER 8 w/ AIX 7
3/18/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
        • L = 2048, N = 224 SHA: SHA-224, SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • KeyPair:
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3216, DRBG #1119
1061Dell Software, Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

Usha Sanagala
usanagala@sonicwall.com
408-962-6248
Fax: 408-745-9300

SonicOS 6.2.5 for TZ, SM and NSA

6.2.5 (Firmware)


The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium CN7020
    • Cavium CN7130
    • Cavium Octeon Plus CN66XX Family
    • Cavium Octeon Plus CN68XX Family
3/18/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3214
1060HPE Data Security
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
(408)886-3200
Fax: (408)886-3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • CPUCPU Intel Xeon E5-2600 v2 w/o AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - OSS
3/11/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3211, DRBG #1115
1059HPE Data Security
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
(408)886-3200
Fax: (408)886-3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • CPU Intel Xeon E5-2600 v2 w/o AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - Guardian
3/11/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3210, DRBG #1114
1058Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

Abraham Joseph Kang
+1-408-324-3678
Fax: +1-408-324-3640

Bumhan Kim
+82-10-4800-6711

Samsung SCrypto

1.0


Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

    • Qualcomm MSM8996 w/ QSEE 4.0
3/4/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3208, DRBG #1112
1057Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

Abraham Joseph Kang
+1-408-324-3678
Fax: +1-408-324-3640

Bumhan Kim
+82-10-4800-6711

Samsung SCrypto

1.0


Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

    • Samsung Electronics Exynos 8890 w/ MOBICORE Tbase 310B
3/4/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3207, DRBG #1111
1056Acronis International GmbH
Rheinweg 9
8200 Schaffhausen
Switzerland

Oleg Mikhalsky
+7 (495) 648-14-27
Fax: +7 (495) 708-44-89

Anton Enakiev
+7 (495) 648-14-27
Fax: +7 (495) 708-44-89

Acronis AnyData Cryptographic Library

1.0


Acronis AnyData Cryptographic Library (AACL) is a cryptographic software module used in various products Acronis.

    • Intel Core i3-3217U without AES-NI w/ Windows 2008 R2 64bit
    • Intel Core i3-3217U without AES-NI w/ Windows 7 Ultimate 32bit
    • Intel Core i5-5300U with AES-NI w/ Windows 7 Ultimate 64bit
    • Intel Core i3-3217U without AES-NI w/ Red Hat Enterprise Linux 6.6
    • Intel Core i3-3217U without AES-NI w/ Red Hat Enterprise Linux 7.1
    • Intel Core i5-5300U with AES-NI w/ Acronis Virtual Appliance Linux 11.5 on vSphere 5.5
    • Intel Core i5-5300U with AES-NI w/ Windows 8.1 Pro 64bit
    • Intel Core i3-3217U without AES-NI w/ Windows 2012 R2 64bit
2/26/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2903, DRBG #880
1055Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-978-264-5211
Fax: 1-978-264-5522

HPE Comware

Comware Crypto 7.1.1.1.1.42 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HP devices.

    • ARM Cortex-A9 1GHz
    • ARM Cortex-A9 1GHz * 2
    • Broadcom XLP108AQ, 1.0Ghz, MIPS
    • Broadcom XLS408, 1.2Ghz, MIPS
    • Broadcom XLP108, 1.0GHz, MIPS
    • Broadcom XLP208, 1GHz, MIPS
    • Broadcom XLP316, 1.2GHz, MIPS
    • Freescale MPC P5040, 1.8 GHz, PowerPC
    • Freescale MPC8548, 1.5 GHz, PowerPC
    • Freescale P2020, 1.0GHz, PowerPC
    • Cavium CN6130, 1Ghz,MIPS
    • Cavium CN6218, 1Ghz,MIPS
    • Cavium CN6635, 1.3Ghz,MIPS
    • Freescale P1016, 667Mhz,PowerPC
    • Freescale P1021, 800Mhz,PowerPC
2/5/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 256
      • Prerequisite: SHS #3177, DRBG #1094
1054Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Bob Pittman
bob.pittman@hpe.com
1-978-264-5211
Fax: 1-978-264-5522

HPE Comware

ComwareV7.1-R7103 (Firmware)


Comware cryptographic library is a software library that provides cryptographic functions within HP devices.

    • Freescale P2020,1.0GHz,PowerPC
    • Freescale P4080, 1.5GHz, PowerPC
2/5/2016
  • DSA:
    • 186-4:
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-1
      • Prerequisite: SHS #3175
1053General Dynamics Mission Systems
150 Rustcraft Road
Dedham, MA 02026
USA

David Aylesworth
David.Aylesworth@gd-ms.com
781-400-6527

Bob Smith
fortressinfo@gd-ms.com
781-455-2806

Fortress Cryptographic Implementation - SSL

2.1 (Firmware)


The Fortress Cryptographic Implementation suite works in unison to provide security to your wireless and wired networks.

    • Broadcom XLS Processor
    • RMI Alchemy MIPS Processor
1/29/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2891, DRBG #874
1052Intel Corporation
2200 Mission College Blvd.
Santa Clara, CA 95054-1549
USA

James Reardon
james.reardon@intel.com
(408) 765-8080

Intel OpenSSL FIPS Object Module

2.0.5


1SUB version of OpenSSL FIPS Object Module.

    • Intel x86_64 w/ Linux 3.10
    • Intel x86_64 w/ Linux 3.10 on VMware ESXi 6.00
1/29/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-256, SHA-384
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3171, DRBG #1093
1051Intel Corporation
2200 Mission College Blvd.
Santa Clara, CA 95054-1549
USA

James Reardon
james.reardon@intel.com
(408) 765-8080

Intel OpenSSL FIPS Object Module

2.0.8


1SUB version of OpenSSL FIPS Object Module

    • Intel x86_64 w/ Linux 3.10
    • Intel x86_64 w/ Linux 3.10 on VMware ESXi 6.00
1/29/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3170, DRBG #1092
1050HPE Data Security
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
(408)886-3200
Fax: (408)886-3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • CPU Intel Itanium 9300, model NB54000c w/ HP NonStop TNS/E J06.19.00 - Guardian
    • CPU Intel Xeon E5-2600 v2 with AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 – Guardian
1/22/2016
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3166, DRBG #1088
1049Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.0.3


Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules

    • Intel Core i7-3615QM w/ Mac OSX Yosemite 10.10.4
1/22/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-256
        • L = 2048, N = 256 SHA: SHA-256
        • L = 3072, N = 256 SHA: SHA-256
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3164, DRBG #1085
1040OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

Steve Marquess
info@openssl.com
301‐874‐2571

OpenSSL FIPS Object Module

2.0.12


The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

    • Intel Atom E3845 (x86) without AES-NI optimizations w/ Linux 3.10 32-bit
    • Intel Atom E3845 (x86) with AES-NI optimizations w/ Linux 3.10 32-bit
1/22/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #2847, DRBG #845
1048Parsec (PTY) Ltd.
76 Regency Drive, Route 21 Corporate Park
Irene, Centurion
Pretoria, Gauteng 0157
South Africa

Tobie van Loggerenberg
tobie@parsec.co.za
+27(0)126789740
Fax: +27(0)126789741

Leon Brits
leonb@parsec.co.za
+27(0)126789740
Fax: +27(0)126789741

OpenSSL FIPS Object Module

2.0.2 (Firmware)


OpenSSL is a comprehensive suite of FIPS Approved and Allowed algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency with a minimum security of 112 bit

    • Atmel AT91SAMG25 (ARM9)
1/15/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3138, DRBG #1038
1047RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

Rohit Mathur
rohit.mathur@rsa.com
+61730325220

RSA BSAFE Crypto-C Micro Edition

4.1.0.1


RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

    • ARMv7 (32-bit) w/ Linaro Linux 3.10.68
1/15/2016
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3137, DRBG #1037
1046MRV Communications, Inc.
300 Apollo Dr.
Chelmsford, MA 01824
USA

Tim Bergeron
tbergeron@mrv.com
978-674-6860

Phil Bellino
pbellino@mrv.com
978-674-6870

LX-Series Algorithm Core

V6.1.0 (Firmware)


The LX-4000T Series Console Servers provide secure remote service serial port access to devices in an organization''s networks and infrastructures. This nearly eliminates the need for physical presence at a site to correct problems or manage its everyday operation.

    • Freescale PQ1 MPC885
12/18/2015
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3134, DRBG #1035
1045Broadcom Corporation
3151 Zanker Road
San Jose, CA 95134
USA

Gary Goodman
Gary.goodman@broadcom.com
408-922-1092
Fax: 408-922-1023

Alfonso Ip
alip@broadcom.com
408-922-5624
Fax: 408-922-8050

PKA-CRYPTO

BCM5810X B0 1.0 (Firmware)


RSA PKCS15 Signature generation and verification. DSA signature generation and verification.

    • ARM M3
12/18/2015
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 256 SHA: SHA-256
      • SigVer:
        • L = 2048, N = 256 SHA: SHA-256
      • Prerequisite: SHS #3132
1044HPE Data Security
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
(408)886-3200
Fax: (408)886-3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • CPU Intel Itanium 9300, model NB54000c w/ HP NonStop TNS/E J06.19.00 - OSS
    • CPU Intel Xeon E5-2600 v2 with AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 – OSS
12/18/2015
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #3131, DRBG #1033
1043Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.0


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6
    • Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6
    • Intel Xeon E5-2697 V3 w/ Ubuntu 14.04 LTS on VMWare ESXi 6.0
12/18/2015
  • DSA:
    • 186-4:
      • PQGGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • PQGVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • KeyPair:
        • L = 2048, N = 224
        • L = 2048, N = 256
        • L = 3072, N = 256
      • Prerequisite: SHS #3126, DRBG #1031
1042HPE Data Security
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
408 886 3200
Fax: 408 886 3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • CPU Intel(R) Core(TM) i7-3770 with AES-NI w/ CentOS Linux release 7.0.1406
    • CPU Intel(R) Core(TM) i7-3770 w/o AES-NI w/ CentOS Linux release 7.0.1406
    • CPU Intel(R) Core(TM) i7-2600 with AES-NI w/ Windows Server 2012 R2
    • CPU Intel(R) Core(TM) i7-2600 w/o AES-NI w/ Windows Server 2012 R2
12/18/2015
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #2791, SHS #2792, SHS #2793, SHS #2794, DRBG #796
1041HP Security Voltage
20400 Stevens Creek Blv
Suite 500
Cupertino, CA 95014
USA

Luther Martin
support@voltage.com
408 886 3200
Fax: 408 886 3201

Voltage Cryptographic Module v.5.0

5.0


The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

    • Intel(R) Core(TM) i7-3770 CPU @ 3.40 GHz w/ CentOS with AES-NI w/ CentOS Linux release 7.0.1406
    • Intel(R) Core(TM) i7-3770 CPU @ 3.40 GHz w/ CentOS w/o AES-NI w/ CentOS Linux release 7.0.1406
12/18/2015
  • DSA:
    • 186-4:
      • SigGen:
        • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • SigVer:
        • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #2791, DRBG #796
1039Thales e-Security Inc.
900 South Pine Island Road
Suite 710
Plantation, FL 33324
USA

sales@thalesesec.com
sales@thalesesec.com
888-744-4976

nShield X Algorithm Library - Cryptographic Accelerator

ICG00169-00-01


The nShield algorithm X library provides cryptographic functionality for Thales nShield Hardware Security Modules.

    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3082, DRBG #985
    1038Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (C and assembler implementation with CPACF) 32 bit

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.

      • IBM/S390 w/ Red Hat Enterprise Linux 7.1
    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3095, RNG #1409, DRBG #1003
    1037Siemens PLM Software
    5800 Granite Parkway
    Suite 600
    Plano, TX 75024
    USA

    Vikas Singh
    singh.vikas@siemens.com
    651-855-6176

    Teamcenter Cryptographic Module

    3.0


    Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals.

      • AMD A4 w/ SUSE Linux 11.2 (x86_64)
      • AMD A4 w/ Windows 7 SP1 (x86)
      • AMD A4 w/ Windows 7 SP1 (x86_64)
      • Intel Core i5 w/ Mac OS X 10.11 (x86_64)
    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3094, RNG #1408, DRBG #988
    1036SAP SE
    Dietmar-Hopp-Allee 16
    Walldorf, NRW 69190
    Germany

    Stephan André
    stephan.andre@sap.com
    +49-6227-7-47474
    Fax: +49-6227-78-55975

    Thomas Rothe
    t.rothe@sap.com
    +49-6227-7-47474
    Fax: +49-6227-78-55989

    SAP CommonCryptoLib Crypto Kernel

    8.4.47.0


    SAP CommonCryptoLib Crypto Kernel is a shared library, i.e. it consists of software only. SAP CommonCryptoLib Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions.

      • IBM POWER5 w/ AIX 5.2
      • IBM POWER7 w/ AIX 6.1 on hypervisor IBM PowerVM 2.2
      • HP 9000/800/rp3440 w/ HP-UX 11.11
      • Intel Itanium 2 w/ HP-UX 11.23
      • Intel Itanium 2 w/ HP-UX 11.31
      • APM X-Gene Mustang w/ Linux 3.12.0
      • Intel Itanium w/ Linux 2.6.32
      • IBM POWER7 w/ Linux 2.6.32 on hypervisor IBM PowerVM 2.2
      • IBM POWER8 with VCIPHER w/ Linux 3.0.101 on hypervisor IBM PowerVM 2.2
      • IBM S/390 (2817) w/ Linux 3.0.101 on hypervisor IBM z/VM 6.2.0
      • AMD Opteron w/ Linux 2.6.5
      • Intel Xeon with AES-NI w/ Linux 3.0.101 on hypervisor VMware ESXi 5.1.0
      • UltraSPARC-IIIi w/ SunOS 5.9
      • SPARC64-V w/ SunOS 5.10
      • Intel Xeon w/ SunOS 5.10
      • Intel Xeon w/ Windows Server 2008 SP2
      • Intel Xeon with AES-NI w/ Windows Server 2008 R2 SP1 on hypervisor VMware ESXi 5.1.0
      • IBM POWER8 with VCIPHER w/ Linux 3.12.51 on hypervisor IBM PowerVM 2.2
    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3084, DRBG #987
    1035SAP SE
    Dietmar-Hopp-Allee 16
    Walldorf, NRW 69190
    Germany

    Stephan André
    stephan.andre@sap.com
    +49-6227-7-47474
    Fax: +49-6227-78-55975

    Thomas Rothe
    t.rothe@sap.com
    +49-6227-7-47474
    Fax: +49-6227-78-55989

    SAP CommonCryptoLib Crypto Kernel

    8.4.47.0


    SAP CommonCryptoLib Crypto Kernel is a shared library, i.e. it consists of software only. SAP CommonCryptoLib Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions.

      • IBM POWER7 w/ AIX 6.1 on hypervisor IBM PowerVM 2.2
      • Intel Itanium 2 w/ HP-UX 11.31
      • IBM POWER7 w/ Linux 2.6.32 on hypervisor IBM PowerVM 2.2
      • AMD Opteron w/ Linux 2.6.32
      • Intel Xeon with AES-NI w/ Linux 3.0.101 on hypervisor VMware ESXi 5.1.0
      • SPARC64-V w/ SunOS 5.10
      • Intel Xeon w/ SunOS 5.10
      • Intel Xeon w/ Windows Server 2008 SP2
      • Intel Xeon with AES-NI w/ Windows Server 2008 R2 SP1 on hypervisor VMware ESXi 5.1.0
    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3083, DRBG #986
    1034Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    sales@thalesesec.com
    sales@thalesesec.com
    888-744-4976

    nShield X Algorithm Library - Firmware

    1.0 (Firmware)


    The nShield algorithm X library provides cryptographic functionality for Thales nShield Hardware Security Modules.

      • Freescale PowerPC
    12/11/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3082, DRBG #985
    1033Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_XLR

    Broadcom XLR 12.1X46D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Motorola PowerQUIC III (e500)
      • Intel Celeron (1.3GH Celeron M)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: DRBG #981
    1032Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_XLP

    Broadcom XLP 12.1X46-D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Intel Celeron (1.3GH Celeron M)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1031Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_CN6335

    CN6335 12.1X46D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon II (CN6335)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1030Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_CN5650

    CN5650 12.1X46-D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon Pluss (CN5650)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1029Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_CN5645

    CN5645 12.1X46-D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon Plus (CN5645)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1028Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - Authentec_CN5230

    CN5230 12.1X46D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon Plus (CN5230)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1027Juniper Networks, Inc.
    1194 North Matilda Ave.
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    JJunos FIPS Version 12.1 X46 - Authentec_CN5020

    CN5020 12.1X46-D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon Plus (CN5020)
    12/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #3074, DRBG #981
    1026Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Shivakumar Muttur
    shivakm@juniper.net
    +91 8061211850

    Balachandra Shanabhag
    shanbhag@juniper.net
    +91 8061219144

    OpenSSL Crypto Lib

    na 14.1X53-D30.3 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Freescale e500mc PowerPC
    12/4/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: DRBG #984
    1025Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Shivakumar Muttur
    shivakm@juniper.net
    +91 8061211850

    Balachandra Shanabhag
    shanbhag@juniper.net
    +91 8061219144

    OpenSSL Crypto Lib

    14.1X53-D30.3 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon E312XX
    12/4/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: DRBG #983
    1024Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Tim Myers
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations

    10.0.10586


    The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November 2015 Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November 2015 Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November 2015 Update (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November 2015 Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November 2015 Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November 2015 Update (x64)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x86)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro November 2015 Update (x86)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 November 2015 Update (x86)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x64)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro November 2015 Update (x64)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update (x64)
      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update (x64)
      • Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise November 2015 Update (x64)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile
      • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile
      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Hub 84" w/ Windows 10 for Surface Hub (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 for Surface Hub (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November 2015 Update (x64)
      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Enterprise November 2015 Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November 2015 Update (x64)
      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Pro November 2015 Update (x64)
    12/4/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3047, DRBG #955
    1023Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (C and assembler implementation with CPACF) 64 bit

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size.

      • IBM/S390 w/ Red Hat Enterprise Linux 7.1
    12/4/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3069, RNG #1406, DRBG #982
    1022Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Mahesh Bommareddy
    mbommareddy@juniper.net
    +1 (408) 936-5493

    Junos FIPS Version 12.1 X46 - OpenSSL

    12.1X46-D40.4 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Motorola PowerQUIC III (e500)
      • Intel Celeron (1.3GH Celeron M)
      • Cavium Octeon II (CN6000 Family)
      • Cavium Octeon Plus (CN5000 Familly)
    12/4/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
        • Prerequisite: DRBG #981
    1021Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Libgcrypt (C implementations) Intel x86 64 bit

    4.0


    Libgcrypt (C implementations) Intel x86 64 bit

      • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.1
    11/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3066, DRBG #980
    1020Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Libgcrypt (C implementations) Intel x86 32 bit

    4.0


    Libgcrypt (C implementations) Intel x86 32 bit

      • Intel x86 32 bit w/ Red Hat Enterprise Linux 7.1
    11/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3065, DRBG #979
    1019Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Libgcrypt (C implementation) s390x Z 64 bit

    4.0


    Libgcrypt (C implementation) IBM/S390 64 bit

      • IBM/S390 64 bit w/ Red Hat Enterprise Linux 7.1
    11/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3064, DRBG #978
    1018Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Libgcrypt (C implementation) s390x 32 bit

    4.0


    Libgcrypt (C implementation) IBM/S390 32 bit

      • IBM/S390 32 bit w/ Red Hat Enterprise Linux 7.1
    11/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3063, DRBG #977
    1017Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Libgcrypt (C implementation) POWER8 LE 64 bit

    4.0


    Libgcrypt (C implementation) POWER8 LE 64 bit

      • POWER8 LE 64 bit w/ Red Hat Enterprise Linux 7.1
    11/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3062, DRBG #976
    1016Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA) 64 bit

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3061, RNG #1404, DRBG #970
    1015Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA) 32 bit

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3060, RNG #1403, DRBG #969
    1014Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (C and assembler impl. with AES acceleration and Altivec)

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size.

      • IBM Power 8E w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3059, RNG #1402, DRBG #968
    1013Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    OpenSSL (C and assembler implementation with CPACF) 32 bit

    4.0


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.

      • IBM/S390 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3054, RNG #1400, DRBG #962
    1012Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    GnuTLS-64-ssse3 for x86_64

    4.0


    GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

      • Intel Xeon x86 (64-bit) w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2990, DRBG #949
    1011Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    GnuTLS-64-ssse3 for x86_32

    4.0


    GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

      • Intel Xeon x86 (32-bit) w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2989, DRBG #948
    1010Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    GnuTLS-64 for s390x

    4.0


    GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

      • IBM/z13 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2988, DRBG #945
    1009Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    GnuTLS-64 for ppcle

    4.0


    GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

      • IBM Power 8E w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2987, DRBG #944
    1008Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    GnuTLS-32 for s390x

    4.0


    GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

      • IBM/z13 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-384
          • L = 2048, N = 256 SHA: SHA-384
          • L = 3072, N = 256 SHA: SHA-384
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2986, DRBG #943
    1007Cleversafe, Inc.
    222 South Riverside Plaza
    Suite 1700
    Chicago, Illinois 60606
    US

    Mark Seaborn
    (312) 423-6640

    Jason Resch
    (312) 423-6640

    Cleversafe FIPS Cryptographic Module

    1.1


    The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon without AES-NI w/ ClevOS 3.8.0-FIPS-EDITION
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2985, DRBG #942
    1006Cleversafe, Inc.
    222 South Riverside Plaza
    Suite 1700
    Chicago, Illinois 60606
    US

    Mark Seaborn
    312.423.6640

    Jason Resch
    (312) 423-6640

    Cleversafe FIPS Cryptographic Module

    1.1


    The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon with AES-NI w/ ClevOS 3.8.0-FIPS-EDITION
    11/27/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2984, DRBG #941
    1005Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Red Hat NSS Softoken (64 bit) s390x

    4.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • IBM/S390 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2971, DRBG #940
    1004Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Red Hat NSS Softoken (64 bit) ppcle

    4.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • IBM Power 8E w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2969, DRBG #938
    1003Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Red Hat NSS Softoken (64 bit) x86_64

    4.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2967, DRBG #937
    1002Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Red Hat NSS Softoken (32 bit) x86_64

    4.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2966, DRBG #936
    1001Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    jreznik@redhat.com

    Red Hat NSS Softoken (32 bit) s390x

    4.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • IBM/S390 w/ Red Hat Enterprise Linux 7.1
    11/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2965, DRBG #935
    1000Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Balachandra Shanabhag
    shanbhag@juniper.net
    +91 8061219144

    OpenSSL Crypto Lib

    14.2R3.8 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
      • Intel Xeon L5238
    11/20/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #2959, DRBG #932
    999RSA, The Security Division of EMC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    Rohit Mathur
    rohit.mathur@rsa.com
    +61730325220

    RSA BSAFE Crypto-C Micro Edition

    4.1.2


    RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • Intel x86 without AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MD) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MD) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Windows Server 2008 Enterprise (/MD) on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows Server 2008 Enterprise (/MD) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows Server 2012 Standard R2 (/MT) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows Server 2012 Standard R2 (/MT) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Windows Server 2012 Standard R2 (/MD) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Windows Server 2012 Standard R2 (/MD) on vCenter SUSE 11
      • Itanium 2 w/ Windows Server 2008 Enterprise (/MD)
      • Itanium 2 w/ Windows Server 2008 Enterprise (/MT)
      • Intel x86 without AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11
      • Intel x86 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11
      • Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11
      • Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11
      • Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11
      • Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11
      • Itanium 2 w/ Red Hat Enterprise Linux 5.11
      • PowerPC 32-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2
      • PowerPC 32-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2
      • PowerPC 64-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2
      • PowerPC 64-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2
      • Intel x64 without AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11
      • SPARC v8 w/ Solaris 10
      • SPARC v8+ w/ Solaris 11
      • SPARC v9 (T2) w/ Solaris 11
      • SPARC v9 (T4) without T4 accelerator w/ Solaris 11
      • Intel x86 without AES-NI w/ Solaris 10 on vCenter SUSE 11
      • Intel x86 with AES-NI w/ Solaris 10 on vCenter SUSE 11
      • Intel x64 without AES-NI w/ Solaris 10 on vCenter SUSE 11
      • Intel x64 with AES-NI w/ Solaris 10 on vCenter SUSE 11
      • Itanium 2 32-bit w/ HPUX 11.31
      • Itanium 2 64-bit w/ HPUX 11.31
      • PA-RISC 2.0 32-bit w/ HPUX 11.31
      • PA-RISC 2.0W 64-bit w/ HPUX 11.31
      • PowerPC 32-bit w/ AIX 6.1 on PowerVM 2.2
      • PowerPC 64-bit w/ AIX 6.1 on PowerVM 2.2
      • PowerPC 32-bit w/ AIX 7.1 on PowerVM 2.2
      • PowerPC 64-bit w/ AIX 7.1 on PowerVM 2.2
      • IBM z196 31/32-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2
      • IBM z196 64-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2
      • ARMv7 w/ Fedora Core 20
      • ARMv7 w/ Ubuntu 12.04 LTS
      • ARMv8 w/ Fedora Core 22
      • Intel x86 w/ Android 4.1
      • ARMv7 w/ Android 4.4
      • ARMv7 w/ Android 5.1
      • ARMv8 w/ Android 5.1
      • PPC 604 w/ VxWorks 6.4
      • PPC 604 w/ VxWorks 6.7
      • ARMv4 w/ VxWorks 6.8
      • SPARC v9 (T4) with T4 accelerator w/ Solaris 11
      • Intel x64 w/ CentOS 6.6
      • Intel Core i7 with AES-NI w/ CentOS 7.2
      • Intel Core i7 without AES-NI w/ CentOS 7.2
    11/20/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2958, DRBG #931
    998NetApp, Inc.
    495 East Java Drive
    Fourth Floor
    Sunnyvale, CA 94089
    USA

    Mike Scanlin
    scanlin@netapp.com
    919.476.8578
    Fax: 919.476.4272

    NetApp Cryptographic Security Module Algorithm Implementations

    1.0


    NCSM will be integrated into select NetApp operating systems and data management products for the purpose of providing FIPS 140-2 compliant management channel encryption.

      • Intel Xeon with AES-NI (AVA 400 appliance) w/ AVOS v4.0.1
      • Intel Xeon with AES-NI (AVA 800 appliance) w/ AVOS v4.0.1
      • Intel Xeon with AES-NI (AVA VM ESXi5.5) w/ AVOS v4.0.1
      • Intel Xeon with AES-NI w/ Debian Linux 8.1
      • Intel Xeon without AES-NI w/ Debian Linux 8.1
      • Intel Xeon with AES-NI w/ FreeBSD 9.1
      • Intel Xeon without AES-NI w/ FreeBSD 9.1
      • Intel Xeon with AES-NI w/ Scientific Linux 6.1
      • Intel Xeon without AES-NI w/ Scientific Linux 6.1
      • Intel Xeon with AES-NI w/ SUSE Linux 11
      • Intel Xeon without AES-NI w/ SUSE Linux 11
    11/20/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2955, DRBG #928
    997Utimaco IS GmbH
    Germanusstraße 4
    Aachen 52080
    Germany

    Dr. Gesa Ott
    hsm@utimaco.com
    +49 241-1696-200
    Fax: +49 241-1696-199

    Dieter Bong
    hsm@utimaco.com
    +49 241-1696-200
    Fax: +49 241-1696-199

    CryptoServer CSe DSA

    dsa1.2.2.1 (Firmware)


    DSA Component implements all DSA key sizes to allow flexibility and efficiency.

      • Texas Instruments TMS320C6457
    11/6/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #3168, DRBG #1089
    996GOTrust Technology Inc.
    10F-1, No.306, Sec. 1, Wenxin Rd., Nantun Dist.
    Taichung City 408
    Taiwan

    Jerry Lin
    jerrylin@go-trust.com
    +886-4-23202525
    Fax: +886-4-23202580

    GO-Trust Cipher Library

    2.0 (Firmware)


    The GO-Trust Cipher Library is designed to provide FIPS140-2 algorithm support for the GO-Trust SDencrypter Cryptographic Module. This module supports GO-Trust applications (for example: KingCall and KingText) by providing validated Cryptographic Services. The incorporation of these algorithms makes these products ideal for enterprise and governmen

      • ARM SecurCore SC300
    11/6/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-256
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #1672, DRBG #902
    995Hewlett Packard Enterprise
    153 Taylor Street
    Littleton, MA 01460
    USA

    Bob Pittman
    bob.pittman@hpe.com
    1-978-264-5211
    Fax: 1-978-264-5522

    HPE Comware

    Comware V5.2-R2514 (Firmware)


    Comware cryptographic library is a software library that provides cryptographic functions within HP devices.

      • Freescale P1010, 553M, PowerPC
      • Freescale P1016, 667M, PowerPC
    11/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-1
        • Prerequisite: SHS #2945
    994Harris Corporation
    1680 University Avenue
    Rochester, NY 14610
    USA

    Steven Ruggieri
    sruggi01@harris.com
    585-239-7806
    Fax: 585-241-8159

    Suzanne Kwak
    skwak@harris.com
    585-242-4686
    Fax: 585-241-8159

    Harris Broadband Ethernet Radio GPP Cryptographic Library

    4.10a (Firmware)


    This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x.

      • Broadcom XLS108
    11/6/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #2943, DRBG #920
    993AlienVault, Inc.
    1875 S. Grant St.
    Suite 200
    San Mateo, CA 94402
    United States

    Jim Hansen
    jhansen@alienvault.com
    650.713.3340

    AlienVault OpenSSL

    2.0.9


    AlienVault USM for Government is a security appliance that provides complete security visibility and compliance management with five essential security capabilities - asset discovery, vulnerability assessment, intrusion detection, netflow, log analysis, and event correlation - into a single console and reporting dashboard.

      • Intel Xeon E5 w/ Debian "Wheezy" 7.8
    10/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-512
          • L = 2048, N = 224 SHA: SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-512
        • SigVer:
          • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2934, DRBG #910
    992VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Gary Sturdivant
    gsturdivant@vmware.com
    1-659-427-4429

    Eric Betts
    betts@vmware.com
    1-650-427-1902

    VMware Horizon JCE (Java Cryptographic Extension) Module

    1.0


    The VMware Horizon JCE (Java Cryptographic Extension) Module is a versatile software library that implements FIPS 140-2 approved cryptographic services for VMware products and platforms.

      • Intel Xeon E5-2630 w/ Horizon 6, version 6.2 with Sun JRE 1.8 on Windows Server 2012R2 running on VMware vSphere Hypervisor (ESXi) 6.0
      • Intel Xeon E5-2630 w/ Horizon 6, version 6.2 with Sun JRE 1.8 on Windows 7 SP1 Enterprise (32-bit) running on VMware vSphere Hypervisor (ESXi) 6.0
    10/23/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2929, DRBG #905
    991Pulse Secure LLC
    2700 Zanker Road Suite 200
    San Jose, CA 95134
    USA

    Yvonne Sang
    ysang@pulsesecure.net
    408-372-9600

    Secure Pulse Cryptographic Module

    1.0


    The Secure Pulse Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies.

      • Intel Pentium E2160 (x86) w/ Pulse Connect Secure 8.0 OR13
    10/16/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: RNG #1212
    990Hewlett Packard Enterprise
    153 Taylor Street
    Littleton, MA 01460
    USA

    Bob Pittman
    bob.pittman@hpe.com
    1-978-264-5211
    Fax: 1-978-264-5522

    HPE Comware

    Comware V5.2-R3303 (Firmware)


    Comware cryptographic library is a software library that provides cryptographic functions within HP devices.

      • Freescale P2020, 1.0GHz, PowerPC
      • Freescale P4080, 1.5GHz, PowerPC
    9/30/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-1
        • Prerequisite: SHS #2918
    989Harris Corporation
    1680 University Avenue
    Rochester, NY 14610
    USA

    Steven Ruggieri
    sruggi01@harris.com
    585-239-7806
    Fax: 585-241-8159

    Suzanne Kwak
    skwak@harris.com
    585-242-4686
    Fax: 585-241-8159

    Harris Broadband Ethernet Radio GPP Cryptographic Library

    4.10 (Firmware)


    This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x.

      • Broadcom XLS108
    9/25/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: SHS #2911, DRBG #887
    988Palo Alto Networks
    4401 Great America Parkway
    Santa Clara, California 95054
    USA

    Richard Bishop
    rbishop@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-3901

    Palo Alto Networks Crypto Module (PA VM-series)

    7.0 (PAN-OS)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

      • Intel Multi Core Xeon w/ PAN-OS v7.0 on VMware ESXi 5.5
      • Intel Multi Core Xeon w/ PAN-OS v7.0 on CentOS 6.5 - KVM
      • Intel Multi Core Xeon w/ PAN-OS v7.0 on Citrix XenServer 6.1.0
    8/18/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #2888, DRBG #871
    987Palo Alto Networks
    4401 Great America Parkway
    Santa Clara, California 95054
    USA

    Richard Bishop
    rbishop@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-3901

    Palo Alto Networks Crypto Module (PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 firewalls, WF-500 and Panorama M-100/M-500)

    7.0 (PAN-OS, Wildfire)/7.1 (Panorama) (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 firewalls, WF-500 and Panorama M-100/M-500.

      • Cavium Octeon MIPS64
      • Intel Multi Core Xeon
      • Intel Celeron P4505
      • Intel i7
    8/15/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #2870, DRBG #870
    986Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    Li Wen
    blue.li@huawei.com
    0086-0755-28976679
    Fax: 0086-0755-28976679

    Huawei Radio Link Encryption (RLE)

    1.0 (Firmware)


    The module provides the functionality of cipher (AES-CCM) transceiver of radio data as security function.

      • n/a
    8/15/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2884, DRBG #865
    985Alcatel-Lucent
    600 March Road
    Ottawa, Ontario K2K 2E6
    Canada

    Carl Rajsic
    carl.rajsic@alcatel-lucent.com
    +1 613 784 6218

    Alfred Nothaft
    alfred.nothaft@alcatel-lucent.com
    +1 972 477 5087

    Alcatel Lucent 7x50 SR OS Cryptographic Library

    1.0 (Firmware)


    The Alcatel-Lucent 7x50 SR OS Cryptographic Library is used on the Alcatel-Lucent 7x50 Service Router products.

      • Cavium Octeon
    7/31/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2878, DRBG #861
    984Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    Li Wen
    blue.li@huawei.com
    0086-0755-28976679
    Fax: 0086-0755-28976679

    Huawei FIPS Cryptographic Library (HFCL)

    V300R003C22SPC804


    Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

      • DELL PowerEdge T110 II Intel Pentium w/ RHEL 5.3 evaluated at EAL4
    7/31/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2872, DRBG #857
    983Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Tim Myers
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations

    10.0.10240


    The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 (x86)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise (x64)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise (x86)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro (x64)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro (x86)
      • Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise (x64)
      • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64)
      • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64)
      • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB (x86)
    7/31/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2886, DRBG #868
    982CoCo Communications
    800 5th Ave
    Seattle, WA 98104
    USA

    David Weidenkopf
    dweidenkopf@cococorp.com
    206-812-5783

    CoCo OpenSSL Windows 7

    2.2


    The CoCo OpenSSL Crypto Module is an OpenSSL cryptographic library that provides cryptographic services to its calling applications.

      • Intel i5 w/ Windows 7 64 bit
    7/24/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2869, DRBG #856
    981Redline Communications, Inc.
    302 Town Centre Blvd., 4th Floor
    Markham, Ontario L3R OE8
    Canada

    Andrew Spurgeon
    aspurgeon@rdlcom.com
    905-479-8344 x2471

    Weixiong Lin
    wlin@rdlcom.com
    905-479-8344 x2372

    RDL-3000 Management Cryptographic Suite

    3.1 (Firmware)


    Provides several cryptographically-secure management interfaces for use in the administration and operation of the RDL-3000 platform.

      • Cavium ECONA CNS3411 SoC
    7/17/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #2866, DRBG #854
    980VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware ESXi Services Cryptographic Engine

    5.5 Update 2


    The VMware ESXI Services Cryptographic Engine provides cryptographic functions for VMware ESXi services.

      • Intel Xeon w/ 64 bit VMware ESXi
    7/10/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2862
    979VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware ESXi Core Cryptographic Engine

    5.5 Update 2


    The VMware ESXI Core Cryptographic Engine provides cryptographic services for VMware ESXi.

      • Intel Xeon w/ 64 bit VMware ESXi
    7/10/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2861
    978Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto core

    2.8.8


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • Intel Xeon w/ CentoOS Linux 7.0 64 bit with Oracle JRE 1.8.0
    7/10/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2860
    977Samsung
    129
    Samsung-ro
    Yeongtong-gu
    Suwon-si, Gyeonggi-do 443-742
    South Korea

    Changsup Ahn
    cs77.ahn@samsung.com
    +82-10-3173-9021
    Fax: +82-31-279-1219

    Jisoon Park
    js00n.park@samsung.com
    +82-10-4556-5007
    Fax: +82-31-279-1219

    CryptoCore_Linux

    NA 0.2.9


    A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on.

      • Intel Core i7 w/ Ubuntu 14.04
    7/2/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2856, RNG #1382
    976Samsung
    129
    Samsung-ro
    Yeongtong-gu
    Suwon-si, Gyeonggi-do 443-742
    South Korea

    Changsup Ahn
    cs77.ahn@samsung.com
    +82-10-3173-9021
    Fax: +82-31-279-1219

    Jisoon Park
    js00n.park@samsung.com
    +82-10-4556-5007
    Fax: +82-31-279-1219

    CryptoCore_Tizen

    NA 0.2.9


    A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on.

      • Samsung Hawk-MU w/ Tizen 2.3
    7/2/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2855, RNG #1381
    975VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware vSphere vCLI Cryptographic Library

    5.5 Update 2


    The VMware vSphere vCLI Cryptographic Engine provide cryptographic services for the VMware Command Line Interface (vCLI)

      • Intel Core i5 w/ Microsoft Windows 7 SP1 64 bit
      • Intel Core i5 w/ Linux x64
    7/2/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2854
    974VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware vCenter Server Virtual Appliance Cryptographic Engine

    Version 5.5 Update 2


    The VMware vCenter Server Virtual Appliance Cryptographic Engine provides the cryptographic services for VMware''s vCenter Server Virtual Appliance.

      • Intel Xeon w/ SLES 11 SP2 for VMware 64bit
    7/2/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2853
    973VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware vSphere Cryptographic Engine

    Version 5.5 Update 2


    The VMware vSphere Cryptographic Engine provides the cryptographic services for multiple VMware server and client applications.

      • Intel Xeon w/ Microsoft Windows Server 2012 R2
    7/2/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2852
    972VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Eric Betts
    betts@vmware.com
    650-427-1902
    Fax: 650-427-5001

    VMware vSphere Client Cryptographic Library

    Version 5.5 Update 2


    The VMware vSphere Client Cryptographic Engine provides cryptographic services VMware vSphere Client.

      • Intel Core i5 w/ Windows 7 SP1 (64bit)
    7/2/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2851
    971SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    Michael Hager
    mike@suse.de
    +49 911 74053 80

    SUSE NSS Module

    1.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel x86-64 w/ SUSE Linux Enterprise Server 12
    7/2/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2848, DRBG #846
    970OpenSSL Software Foundation, Inc.
    1829 Mount Ephraim Road
    Adamstown, MD 27101
    USA

    Steve Marquess
    info@openssl.com
    301‐874‐2571

    OpenSSL FIPS Object Module

    2.0.11


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Intel Core 2 Duo (x86) w/ VxWorks 6.7
      • IBM POWER 7 (PPC) w/ AIX 7.1 64-bit
      • IBM POWER 7 (PPC) w/ AIX 6.1 32-bit
      • IBM POWER 7 (PPC) w/ AIX 6.1 64-bit
      • IBM POWER 7 (PPC) w/ AIX 7.1 32-bit
      • Intel Xeon E5-2420 (x86) without AES-NI w/ DataGravity Discovery Series OS V2.0
      • Intel Xeon E5-2420 (x86) with AES-NI w/ DataGravity Discovery Series OS V2.0
      • IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 32-bit
      • IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 64-bit
      • Intel Xeon E5-2430L (x86) with AES-NI optimizations w/ Ubuntu 12.04
      • Intel Xeon E5-2430L (x86) without optimizations w/ Ubuntu 12.04
      • Intel Atom E3845 (x86) without AES-NI optimizations w/ Linux 3.10 32-bit
      • Intel Atom E3845 (x86) with AES-NI optimizations w/ Linux 3.10 32-bit
    7/2/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2847, DRBG #845
    969Canon
    One Canon Park
    Melville, NY 11747
    USA

    Jiuyuan Ge
    jge@ciis.canon.com
    631-330-5774

    Canon imageRunner Crypto Module for MEAP

    2.1.1


    Canon imageRUNNER Crypto Module for MEAP is a cryptographic module which protects stored and transmitted data using FIPS approved cryptographic algorithms.

      • Intel Atom Processor D410 w/ MontaVista Linux
    6/25/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2842
    968Dell, Inc
    5450 Great America Parkway
    Santa Clara, CA 95054
    US

    Srihari Mandava
    srihari_mandava@dell.com

    Dell OpenSSL Cryptographic Library

    2.3


    Dell OpenSSL Cryptographic Library v2.3 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features.

      • Intel Atom S1000 w/ Dell Networking Operating System 9.8(0.0)
      • FreeScale PowerPC e500 w/ Dell Networking Operating System 9.8(0.0)
      • Intel Atom C2000 w/ Dell Networking Operating System 9.8(0.0)
      • Broadcom XLP w/ Dell Networking Operating System 9.8(0.0)
    6/25/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2840, DRBG #839
    967SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    Michael Hager
    mike@suse.de
    +49 911 74053 80

    Libgcrypt (AES-NI and C implementation for SHA)

    1.0


    SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG.

      • Intel x86-64 w/ SUSE Linux Enterprise Server 12
    6/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: DRBG #831
    966RSA, The Security Division of EMC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    Sandy Carielli
    sandra.carielli@rsa.com
    781-515-7510

    RSA BSAFE Crypto-C Micro Edition (ME)

    3.0.0.25


    RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • ARM11 MPCore (ARMv6k) w/ VxWorks 6.8.2
    6/11/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2829
    965Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Scott McKinnon
    smckinnon@juniper.net

    Junos FIPS Version 12.1 X46 -OpenSSL_KeyGen

    12.1 X46 D20.6 (Firmware)


    Juniper Networks, Inc. JUNOS 12.1 X46 for SRX and LN Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy.

      • Cavium Octeon CN5645 w/ internal accelerators (HW/FW)
      • Cavium Octeon CN5645 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6
    6/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
        • Prerequisite: DRBG #785
    948Information Assurance Specialists, Inc.
    900 Route 168
    Suite C4
    Turnersville, NJ 08012
    USA

    William Morgan
    william.morgan@iaspecialists.com
    856-581-8033 Ext. 1006
    Fax: 856-228-1265

    Keiron Tomasso
    keir.tomasso@iaspecialists.com
    856-581-8033 Ext. 1001
    Fax: 856-228-1265

    IAS Router FIPS

    7a55571 – 2015‐05‐07 (Firmware)


    IAS Router FIPS is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel Bay Trail with AES-NI
    6/11/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: DRBG #782
    964Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    sales@thalesesec.com
    sales@thalesesec.com
    888-744-4976

    nShield Algorithm Library

    2.61.2 (Firmware)


    The nShield algorithm library provides cryptographic functionality for Thales nShield Hardware Security Modules

      • Freescale PowerPC
    6/5/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2826, DRBG #825
    963Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    sales@thalesesec.com
    sales@thalesesec.com
    888-744-4976

    MiniHSM Algorithm Library

    2.61.2 (Firmware)


    The MiniHSM Algorithm Library provides cryptographic functionality for the MiniHSM series of Thales hardware security modules.

      • Freescale DragonBall MXL
    6/5/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2825, DRBG #824
    962Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com
    d

    CiscoSSL FIPS Object Module

    6.0


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

      • Cavium Octeon MIPS64 w/ Linux 2.6
      • Intel Xeon w/ FreeBSD 9.2
    5/22/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2818, DRBG #818
    961Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com
    d

    CiscoSSL FIPS Object Module (Assembler)

    6.0


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

      • Intel Xeon w/ Linux 2.6
      • Cavium Octeon MIPS64 w/ Linux 2.6
      • ARMv7 w/ Android 4.4
      • Intel Core i7 w/ Windows 8.1
      • Intel Core i7 with AES-NI w/ Windows 8.1
      • Intel Core i7 w/ Windows 10
      • Intel Core i7 with AES-NI w/ Windows 10
    5/22/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2817, DRBG #817
    960Dell Software, Inc.
    5455 Great America Parkway
    Santa Clara, CA 95051
    USA

    Usha Sanagala
    usanagala@sonicwall.com
    408-962-6248
    Fax: 408-745-9300

    SonicOS 6.2.1 for SM9800

    6.2.1 (Firmware)


    The Dell(tm) SonicWALL(tm) SuperMassive(tm) Series is Dell''s next-generation firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

      • Cavium Octeon II CN 6640-8core
    5/22/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2816
    959Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Luis Luciani
    luis.luciani@hp.com
    281-518-6762

    iLO SSL Firmware Crypto Library

    2.11 (Firmware)


    The HP Integrated Lights-Out 4 (HP iLO 4) built into HP ProLiant Gen8 and Gen9 servers is an autonomous secure management component embedded directly on the server motherboard. iLO SSL Firmware Crypto Library provides the cryptographic operations required for secure communication and management.

      • ARM-926
    5/22/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 2048, N = 224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2814, DRBG #814
    958Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Scott McKinnon
    smckinnon@juniper.net

    Junos FIPS Version 12.1 X46 - Authentec_KeyGen

    12.1 X46 D20.6 (Firmware)


    Juniper Networks, Inc. JUNOS 12.1 X46 for SRX and LN Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy.

      • Cavium Octeon CN5645 w/ internal accelerators (HW/FW)
      • Cavium Octeon CN5645 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6
    5/22/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
        • Prerequisite: DRBG #785
    957HP Security Voltage
    20400 Stevens Creek Blv
    Suite 500
    Cupertino, CA 95014
    USA

    Luther Martin
    support@voltage.com
    (408) 886 - 3200
    Fax: (408) 886 - 3201

    Voltage Cryptographic Module v.5.0

    5.0


    The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

      • Intel(R) Core(TM) i7-2600 CPU @ 3.40 GHz w/ Windows Server 2012 R2 w/o AES-NI w/ 64-bit Windows Server 2012 R2 Standard
    5/22/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2794
    956HPE Data Security
    20400 Stevens Creek Blv
    Suite 500
    Cupertino, CA 95014
    USA

    Luther Martin
    support@voltage.com
    (408) 886 - 3200
    Fax: (408) 886 - 3201

    Voltage Cryptographic Module v.5.0

    5.0


    The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

      • Intel(R) Core(TM) i7-2600 CPU @ 3.40 GHz w/ Windows Server 2012 R2 with AES-NI w/ 64-bit Windows Server 2012 R2 Standard
    5/22/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2793, DRBG #798
    955HP Security Voltage
    20400 Stevens Creek Blv
    Suite 500
    Cupertino, CA 95014
    USA

    Luther Martin
    support@voltage.com
    (408) 886 - 3200
    Fax: (408) 886 - 3201

    Voltage Cryptographic Module v.5.0

    5.0


    The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40 GHz w/ CentOS w/o AESNI w/ CentOS Linux release 7.0.1406
    5/22/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2792, DRBG #797
    954HP Security Voltage
    20400 Stevens Creek Blv
    Suite 500
    Cupertino, CA 95014
    USA

    Luther Martin
    support@voltage.com
    (408) 886 - 3200
    Fax: (408) 886 - 3201

    Voltage Cryptographic Module v.5.0

    5.0


    The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40 GHz w/ CentOS with AES-NI w/ CentOS Linux release 7.0.1406
    5/15/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #2791, DRBG #796
    953LogRhythm
    4780 Pearl East Circle
    Boulder, CO 80301
    USA

    Emily Dobson
    emily.dobson@logrhythm.com
    720-881-5348

    LogRhythm OpenSSL

    6.3.4


    This module provides support for secure communications over a network using the OpenSSL library.

      • Intel Xeon E5-2420 w/ Microsoft Windows Server 2008 R2
    5/15/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2787, DRBG #790
    952Northop Grumman M5 Network Security
    Level 1
    218 Northbourne Avenue
    Braddon, ACT 2612
    Australia

    Warwick Hoyle
    warwick.hoyle@au.ngc.com
    +611300656019
    Fax: +611300365893

    Kristian Howard
    kristian.howard@au.ngc.com
    +611300656019
    Fax: +611300365893

    SCS OpenSSL Cryptographic Services

    SCS-100 (Firmware 23)


    A module that provides a C-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms

      • Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6)
      • Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6)
    5/8/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
        • Prerequisite: RNG #1364
    951Northop Grumman M5 Network Security
    Level 1
    218 Northbourne Avenue
    Braddon, ACT 2612
    Australia

    Warwick Hoyle
    warwick.hoyle@au.ngc.com
    +611300656019
    Fax: +611300365893

    Kristian Howard
    kristian.howard@au.ngc.com
    +611300656019
    Fax: +611300365893

    SCS Java Cryptographic Services

    SCS-100 (Firmware 23)


    A module that provides a Java-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms

      • Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6)
      • Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6)
    5/8/2015
    • DSA:
      • 186-4:
        • KeyPair:
          • L = 2048, N = 224
        • Prerequisite: SHS #2784, DRBG #789
    950Nimble Storage Inc.
    211 River Oaks Parkway
    San Jose, CA 95134
    USA

    Kent Peacock
    kent@nimblestorage.com
    +1-408-514-3452

    Nimble Storage FIPS Object Module

    2.0.9


    The Nimble Storage OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.9. It is incorporated into the family of Nimble Storage appliances.

      • Intel E5-2403V2 with AES-NI w/ Linux 2.6
      • Intel E5-2450V2 with AES-NI w/ Linux 2.6
      • Intel E5-2470V2 with AES-NI w/ Linux 2.6
      • Intel E5-2603V3 with AES-NI w/ Linux 2.6
      • Intel E5-2699V3 with AES-NI w/ Linux 2.6
      • Intel E5-2680V3 with AES-NI w/ Linux 2.6
      • Intel E5-2620V3 with AES-NI w/ Linux 2.6
      • Intel Xeon with AES-NI w/ Linux 4.4
      • Intel Xeon without AES-NI w/ Linux 4.4
    5/8/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2778, DRBG #784
    949Dell, Inc
    5450 Great America Parkway
    Santa Clara, CA 95054
    US

    Srihari Mandava
    srihari_mandava@dell.com

    Dell OpenSSL Cryptographic Library

    2.2


    Dell OpenSSL Cryptographic Library v2.2 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features.

      • Intel Atom C2000 w/ Dell Networking Operating System 9.8(0.0)
      • Intel Atom S1000 w/ Dell Networking Operating System 9.8(0.0)
      • Broadcom XLP w/ Dell Networking Operating System 9.8(0.0)
      • FreeScale PowerPC e500 w/ Dell Networking Operating System 9.8(0.0)
    5/8/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2777, DRBG #783
    947Samsung Electronics Co., Ltd.
    416, Maetan 3-Dong Youngton Gu
    Suwon, Gyeonggi 152-848
    South Korea

    Abraham Joseph Kang
    +1-408-324-3678
    Fax: +1-408-324-3640

    Bumhan Kim
    +82-10-4800-6711

    Samsung SCrypto

    1.0


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos 7420 w/ MOBICORE Tbase 302A
    4/17/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2773, RNG #1361, DRBG #781
    946Sony Mobile Communications Inc.
    1-8-15 Kohnan
    Minato-ku, Tokyo 108-0075
    Japan

    Takuya Nishibayashi
    Xperia.FIPS.Contact@sonymobile.com
    +81-3-5782-5285
    Fax: +81-3-5782-5258

    Xperia Cryptographic Module DSA Component

    1.0.0


    Xperia Cryptographic Module DSA Component provides cryptographic service for Android mobile device.

      • Qualcomm Snapdragon 810 (ARMv8) with Cryptographic Instructions w/ Android 5.0
      • Qualcomm Snapdragon 810 (ARMv8) without Cryptographic Instructions w/ Android 5.0
    4/17/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2762, DRBG #774
    945Juniper Networks, Inc.
    1194 North Mathilda Avenue
    Sunnyvale, CA 94089
    USA

    Balachandra Shanabhag
    shanbhag@juniper.net
    +91 8061214260

    OpenSSL Crypto Lib

    Junos 14.1R4 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel LC5500 and LC3500 Jasper Forest family
      • Intel L52xx Wolfdale family
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2736
    944LG Electronics, Inc.
    20 Yoido-dong
    Youngdungpo-gu
    Seoul 152-721
    Republic of Korea

    Jongseong Kim
    Joonwoong.kim@lge.com
    82-10-2207-1919
    Fax: 82-2-6950-2080

    Adam Wick
    awick@galois.com
    503-808-7216
    Fax: 503-350-0833

    LG OpenSSL

    2.0.8


    General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library.

      • Qualcomm Snapdragon 800-series (32-bit) w/ Android 5.0.1
      • Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1
    3/20/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2730, RNG #1354, DRBG #749
    943LG Electronics, Inc.
    20 Yoido-dong
    Youngdungpo-gu
    Seoul 152-721
    Republic of Korea

    Jongseong Kim
    Joonwoong.kim@lge.com
    82-10-2207-1919
    Fax: 82-2-6950-2080

    Adam Wick
    awick@galois.com
    503-808-7216
    Fax: 503-350-0833

    LG Framework

    1.0.0


    General-purpose cryptographic services available for Android used by LG devices to provide secured services to Java applications via the Bouncy Castle Java Cryptography Extension provider.

      • Qualcomm Snapdragon 800-series (32-bit) w/ Android 5.0.1
      • Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1
    3/20/2015
    • DSA:
      • 186-4:
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2728, RNG #1352, DRBG #748
    942Hewlett-Packard (TippingPoint)
    14231 Tandem Boulevard
    Austin, TX 78728
    USA

    Kevin Pimm
    kevin.h.pimm@hp.com
    (512) 432-2969

    HP TippingPoint Crypto Core NSS

    3.12.9.1


    This implementation represents a version of the FIPS certified Mozilla Network Security Services (NSS) compiled for CentOS 5.6.

      • Intel Xeon E5-2620v3 w/ CentOS 5.6
      • Intel Xeon E5-2690v3 w/ CentOS 5.6
    3/20/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2723
    941IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on XGS 7100

    8.4.0.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel E5-2658 v2 2.4 GHz w/ RHEL 6.3 Linux
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2722
    940IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on XGS 5100

    8.4.0.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel Core i7-2600 3.4 GHz w/ RHEL 6.3 Linux
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2721
    939IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on XGS 4100

    8.4.0.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel i3-2115C 2.0 GHz w/ RHEL 6.3 Linux
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2720
    938Hewlett Packard Enterprise
    14231 Tandem Boulevard
    Austin, TX 78728
    USA

    Kevin Pimm
    kevin.h.pimm@hpe.com
    (512) 432-2969

    TippingPoint Crypto Core OpenSSL

    2.0.8


    This implementation represents a version of the FIPS certified Mozilla Network Security Services (NSS) compiled for CentOS 5.6.

      • Intel Xeon E5-2620v3 w/ CentOS 5.6
      • Intel Xeon E5-2690v3 w/ CentOS 5.6
    3/20/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2719, DRBG #739
    937IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on XGS 3100

    8.4.0.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel Pentium B915C 1.5 GHz w/ RHEL 6.3 Linux
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2718
    936IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on SP4001

    8.4.0.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel Core i7-2600 3.4 GHz w/ Windows Server 2012 R2 64-bit
    3/20/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2717
    935Zoll Medical
    269 Mill Rd.
    Chemlsford, MA 01824
    USA

    Navid Shaidani
    nshaidani@zoll.com
    978-421-9843

    Bryan Newman
    bnewman@zoll.com
    978-421-9843

    OpenSSL Fips Object Module

    * 2.0.7 (Firmware)


    OpenSSL Fips Object Module implements all necessary algorithms required for SSL communications.

      • Texas Instruments AM3703 Cortex A8 (ARM 7)
    3/20/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2714, DRBG #734
    933OpenSSL Validation Services, Inc.
    1829 Mount Ephraim Road
    Adamstown, MD 21710
    USA

    Steve Marquess
    marquess@veridicalsystems.com
    301-874-2571

    OpenSSL FIPS Object Module

    2.0.10


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Apple A7 (ARMv8) 64-bit without NEON and Crypto Extensions w/ iOS 8.1
      • Apple A7 (ARMv8) 64-bit with NEON and Crypto Extensions w/ iOS 8.1
      • Freescale P2020 (PPC) w/ VxWorks 6.9
      • Apple A7 (ARMv8) with NEON w/ iOS 8.1 32-bit
      • Apple A7 (ARMv8) without NEON w/ iOS 8.1 32-bit
      • Qualcomm APQ8084 (ARMv7) without NEON w/ Android 5.0 32-bit
      • Qualcomm APQ8084 (ARMv7) with NEON w/ Android 5.0 32-bit
      • SAMSUNG Exynos7420 (ARMv8) without NEON and Crypto Extensions w/ Android 5.0 64-bit
      • SAMSUNG Exynos7420 (ARMv8) with NEON and Crypto Extensions w/ Android 5.0 64-bit
      • Intel Xeon E5-2430L (x86) with AES-NI optimizations w/ FreeBSD 10.2
      • Intel Xeon E5-2430L (x86) without AES-NI optimizations w/ FreeBSD 10.2
      • Freescale i.MX6 (ARMv7) w/ Yocto Linux 3.10
      • Freescale i.MX6 (ARMv7) with NEON w/ Yocto Linux 3.10
      • ARM926EJ-S (ARMv5) w/ Linux 4.4
      • PowerPC 440 (PPC) w/ Timesys 2.6
      • Marvell Feroceon 88FR131 (ARMv5TE) w/ uClinux-dist-5.0
      • Marvell Armada 370 (ARMv7) w/ uClinux-dist-5.0
      • ARM926EJS (ARMv5TEJ) w/ uClibc 0.9
      • Marvell PJ4 (ARMv7) w/ uClibc 0.9
      • ARM922T (ARMv4T) w/ uClibc 0.9
      • Intel Xeon E3-1231 (x86) without AES-NI w/ LMOS 7.2
      • Intel Xeon E3-1231 (x86) with AES-NI w/ LMOS 7.2
      • Intel Xeon E5-2430L without AES-NI w/ LMOS 7.2 under VMware ESXi 6.5
      • Intel Xeon E5-2430L with AES-NI w/ LMOS 7.2 under VMware ESXi 6.5
      • Marvell Mohawk (ARMv5TE) w/ Debian 7.9
      • Atmel ATSAMA5D35 (ARMv7) w/ Linux 3.16
      • Atmel ATSAM9G45 (ARMv5TEJ) w/ Linux 3.16
      • Intel Atom Z3735F (x86) w/ Android 4.4 32-bit
      • ARM Cortex A9 (ARMv7) without NEON w/ Linux 3.14
      • ARM Cortex A9 (ARMv7) with NEON w/ Linux 3.14
      • Intel Xeon E5-165 without AES-NI w/ BAE Systems STOP 8.2 64-bit running on BAE XTS-600-W-T
      • Intel Xeon E5-165 with AES-NI w/ BAE Systems STOP 8.2 64-bit running on BAE XTS-600-W-T
      • Cortex-A9 (ARMv7) w/ Ubuntu 12.04
    3/13/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2702, DRBG #723
    932RSA, The Security Division of EMC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    Sandy Carielli
    sandra.carielli@rsa.com
    781-515-7510

    RSA BSAFE® Crypto-J JSAFE and JCE Software Module

    6.2


    RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements

      • Intel Core i7 w/ Windows 8.1 (64-bit)
      • NVIDIA Tegra 3 w/ Android 4.1.2
      • Intel Xeon w/ CentOS 6.7
    3/13/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2701, DRBG #722
    931IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on Windows x86-64 for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel x86_64 w/ Microsoft Windows Server 2008
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2688
    930IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on Windows x86-64 for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel x86_64 w/ Microsoft Windows Server 2008
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2687
    929IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on Ubuntu PPC64 for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM Power8 w/ Ubuntu 14.04 LE
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2685
    928IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on Solaris Sparc for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Sparc T4 w/ Solaris 11
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2683
    927IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on Solaris Sparc for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Sparc T4 w/ Solaris 11
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2681
    926IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on SLES zSeries for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM zSeries s390x w/ SUSE Linux Enterprise Server 11
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2679
    925IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on SLES zSeries for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM zSeries s390x w/ SUSE Linux Enterprise Server 11
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2677
    924IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on RHEL x86-64 for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel x86_64 w/ Red Hat Linux Enterprise Server 7.0
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2676
    923IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on RHEL x86-64 for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • Intel x86_64 w/ Red Hat Linux Enterprise Server 7.0
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2675, DRBG #696
    922IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on RHEL PPC64 for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM Power8 w/ Red Hat Linux Enterprise Server 7.0 BE
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2672
    921IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on RHEL PPC64 for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM Power8 w/ Red Hat Linux Enterprise Server 7.0 BE
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2670
    920IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on AIX PPC64 for 64 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM Power8 w/ IBM AIX 7.1
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2668
    919IBM® Corporation
    Seabank Centre
    12 - 14 Marine Parade
    Southport, QLD 4215
    Australia

    Peter Waltenberg
    pwalten@au1.ibm.com
    +61 7 5552 4016
    Fax: +61 7 5571 0420

    ICC Algorithmic Core on AIX PPC64 for 32 bits

    8.4.1.0


    ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

      • IBM Power8 w/ IBM AIX 7.1
    3/6/2015
    • DSA:
      • 186-4:
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2666
    918Axway Inc.
    2600 Bridge Parkway Suite 201
    Redwood City, California 94065
    USA

    Tom Donahoe
    tdonahoe@axway.com
    480-627-1800
    Fax: 480-627-1801

    Paul Keane
    pkeane@axway.com
    650-801-3176
    Fax: 650-801-3101

    Axway Security Kernel

    3.0.1


    Axway Validation Authority Suite - a collection of products that provide flexible and robust OCSP/SCVP certificate validation solution for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions.

      • Intel Xeon E5-2620 w/ RHEL 6.3 64bit
      • Sun UltraSparc T1 w/ Solaris 10 64bit
      • Intel Xeon E5-2620 w/ Microsoft Windows 2012 64bit
    2/27/2015
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2663
    917Hewlett Packard Enterprise
    153 Taylor Street
    Littleton, MA 01460
    USA

    Bob Pittman
    bob.pittman@hp.com
    1-978-264-5211
    Fax: 1-978-264-5522

    HP Comware

    ComwareV7.1-R2416 (Firmware)


    Comware cryptographic library is a software library that provides cryptographic functions within HP devices.

      • Broadcom XLP108AQ 1GHz
    2/20/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 256
        • Prerequisite: SHS #2654, DRBG #681
    916Cavium, Inc.
    2315 N. First Street
    San Jose, CA 95131
    USA

    Tejinder Singh
    Tejinder.Singh@caviumnetworks.com
    408-943-7403
    Fax: 408-577-1992

    Phanikumar Kancharla
    Pkkancharla@caviumnetworks.com
    408-943-7496

    Cavium Crypto Library

    1.0.0 (Firmware)


    This module implements listed algorithms OpenSSL and Octeon 61XX processor.

      • Cavium Octeon Family, CN61XX
    2/13/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2652, DRBG #680
    915SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    Michael Hager
    mike@suse.de
    +49 911 74053 80

    OpenSSL (AES-NI and AVX+SSSE3 for SHA-1)

    2.0


    OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. This test covers the AES-NI implementation of AES and AVX+SSSE3 assembler implementation of SHA-1 on Intel x86 64bit HP hardware.

      • Intel x86-64 w/ SUSE Linux Enterprise Server 12
    2/13/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2645, DRBG #674
    914Websense, Inc.
    10240 Sorrento Valley Road
    San Diego, CA 92121
    USA

    Matt Sturm
    msturm@websense.com

    Java Crypto Module

    2.0


    The Websense Java Crypto Module provides cryptographic functions for a variety of security solutions from Websense.

      • Intel Xeon E5-2400 w/ Microsoft Windows Server 2012
    1/30/2015
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2637, DRBG #668
    913Samsung Electronics Co., Ltd.
    416, Maetan 3-Dong Youngton Gu
    Suwon, Gyeonggi 152-848
    South Korea

    Abraham Joseph Kang
    +1-408-324-3678
    Fax: +1-408-324-3640

    Bumhan Kim
    +82-10-4800-6711

    Samsung SCrypto

    1.0


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Qualcomm MSM8974 w/ QSEE 2.0
    12/24/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2627, RNG #1342, DRBG #659
    912Samsung Electronics Co., Ltd.
    416, Maetan 3-Dong Youngton Gu
    Suwon, Gyeonggi 152-848
    South Korea

    Abraham Joseph Kang
    +1-408-324-3678
    Fax: +1-408-324-3640

    Bumhan Kim
    +82-10-4800-6711

    Samsung SCrypto

    1.0


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos 5422 w/ MOBICORE Tbase 300
    12/24/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2616, DRBG #656
    911Barracuda Networks
    3175 Winchester Road
    Campbell, CA 95008
    USA

    Andrea Cannon
    acannon@barracuda.com
    703-743-9068

    Barracuda Cryptographic Software Module

    1.0.1.8


    The Barracuda Cryptographic Software Module is a cryptographic software library that provides fundamental cryptographic functions for applications in Barracuda security products that use Barracuda OS v2.3.4 and require FIPS 140-2 approved cryptographic functions.

      • Intel Xeon, Intel Xeon with AES-NI, AMD Opteron, AMD Opteron with AES-NI w/ Barracuda OS v2.3.4
    12/19/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2618, DRBG #651
    910Red Hat, Inc.
    1801 Varsity Drive
    Raleigh, NC 27606
    USA

    Ann-Marie Rubin
    arubin@redhat.com
    978 392 1000

    Linux Kernel crypto API (ibm-64-gen)

    2.6.32-504.23.1


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel - this tests covers the generic C implementations of various ciphers on Intel x86 64 bit IBM hardware.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    12/5/2014
    • DSA:
      • 186-4:
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2608
    909Red Hat, Inc.
    1801 Varsity Drive
    Raleigh, NC 27606
    USA

    Ann-Marie Rubin
    arubin@redhat.com
    978 392 1000

    Linux Kernel crypto API (hp-64-gen)

    2.6.32-504.23.1


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel - this tests covers the generic C implementations of various ciphers on Intel x86 64 bit HP hardware.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    12/5/2014
    • DSA:
      • 186-4:
        • SigVer:
          • L = 2048, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2607
    908Red Cocoa II
    8200 Cody Drive
    Suite G-2
    Lincoln, NE 68512
    USA

    Andy Lenhart
    alenhart@red-cocoa.com
    (402) 467-1086

    Mark Nispel
    mnispel@red-cocoa.com
    (402) 467-1086

    DSA Signature Verification Component

    aa0ed0bfb34c582984e859db23ac420aa83be516 (Firmware)


    DSA Signature Verification implements signature verification with pre-loaded prime and key values.

      • ST Micro STM32 F4 Series
    12/5/2014
    • DSA:
      • 186-4:
        • SigVer:
          • L = 3072, N = 256 SHA: SHA-256
        • Prerequisite: SHS #2605
    907McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Mark Hanson
    mark_hanson@mcafee.com
    +1 651 628 1633
    Fax: +1 651 628 2706

    McAfee Linux libgcrypt Cryptographic Engine

    1.6.2


    McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products.

      • Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi5.0 hypervisor
    12/5/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2604, RNG #1334
    906McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Mark Hanson
    mark_hanson@mcafee.com
    +1 651 628 1633
    Fax: +1 651 628 2706

    McAfee Linux libgcrypt Cryptographic Engine

    1.6.2 (Firmware)


    McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products.

      • Celeron
      • Core i3
      • Xeon E5540
    12/5/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2603, RNG #1333
    905INSIDE Secure
    Eerikinkatu 28
    Helsinki 00180
    Finland

    Serge Haumont
    shaumont@insidesecure.com
    +358 40 5808548

    Marko Nippula
    mnippula@insidesecure.com
    +358 40 7629394

    SafeZone FIPS Cryptographic Module

    n 1.1


    SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. This compact and portable module provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to DAR, DRM, TLS, and VPN.

      • Intel Atom Z3740 with AES-NI w/ 64 bit library w/ Ubuntu Linux (kernel 3.13)
      • Intel Atom Z2560 w/ 32 bit library w/ Android 4.2
      • Intel Atom Z3740 with AES-NI w/ 32 bit library w/ Ubuntu Linux (kernel 3.13)
      • Intel Atom Z3740 without AES-NI w/ 64 bit library w/ Ubuntu Linux (kernel 3.13)
      • ARMv6 w/ Raspbian Linux (kernel 3.10)
      • ARMv7 w/ iOS 7.1
      • ARM64 with ARMv8 Crypto Extensions w/ iOS 7.1
      • iOS 7.1 w/ iOS 7.1
      • ARMv7-a w/ <t-base-300 Trusted Execution Environment
    11/21/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2599, DRBG #634
    904RSA, The Security Division of EMC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    Sandy Carielli
    sandra.carielli@rsa.com
    781-515-7510

    RSA BSAFE Crypto-C Micro Edition (ME)

    3.0.0.23


    RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • ARM Cortex A7 Dual Core w/ Linaro Linux (kernel 3.10.33)
    11/14/2014
    • DSA:
      • 186-4:
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
        • Prerequisite: SHS #2578
    903Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Ann Marie Rubin
    arubin@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA) 64 bit

    1.0.1e‐30.el6_6.5


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    11/14/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2577, RNG #1329, DRBG #631
    902SafeNet, Inc.
    4690 Millennium Drive
    Belcamp, MD 21017
    USA

    Langley Rock
    Langley.Rock@safenet-inc.com
    613.221.5068
    Fax: 613.723.5079

    Laurie Mack
    Laurie.Mack@safenet-inc.com
    613.221.5065
    Fax: 613.723.5079

    ProtectServer Internal Express Cryptographic Library

    5 (Firmware)


    The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-256
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2576, DRBG #428
    901McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Mark Hanson
    mark_hanson@mcafee.com
    +1 651 628 1633
    Fax: +1 651 628 2706

    McAfee Linux OpenSSL

    1.0.1


    McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances.

      • Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi 5.0 hypervisor
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2573, DRBG #628
    900McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Mark Hanson
    mark_hanson@mcafee.com
    +1 651 628 1633
    Fax: +1 651 628 2706

    McAfee Linux OpenSSL

    1.0.1 (Firmware)


    McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances.

      • Celeron
      • Core i3
      • Xeon E5540
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • PQGVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • L = 2048, N = 256 SHA: SHA-256, SHA-384, SHA-512
          • L = 3072, N = 256 SHA: SHA-256, SHA-384, SHA-512
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2572, DRBG #627
    899Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Ann Marie Rubin
    arubin@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA) 64 bit

    1.0.1e-30.el6_6.5


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2570, RNG #1326, DRBG #626
    898Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Ann Marie Rubin
    arubin@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA)

    1.0.1e‐30.el6_6.5


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2569, RNG #1325, DRBG #625
    897Red Hat, Inc.
    100 East Davie Street
    Raleigh, NC 27601
    USA

    Ann Marie Rubin
    arubin@redhat.com

    OpenSSL (AES-NI and AVX+SSSE3 for SHA) 32 bit

    1.0.1e‐30.el6_6.5


    User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.

      • Intel x86 w/ Red Hat Enterprise Linux 6.6
    11/7/2014
    • DSA:
      • 186-4:
        • PQGGen:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • PQGVer:
          • L = 2048, N = 224 SHA: SHA-224
          • L = 2048, N = 256 SHA: SHA-256
          • L = 3072, N = 256 SHA: SHA-256
        • SigGen:
          • L = 2048, N = 224 SHA: SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-224, SHA-256
        • SigVer:
          • L = 1024, N = 160 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 224 SHA: SHA-1, SHA-224, SHA-256
          • L = 2048, N = 256 SHA: SHA-1, SHA-224, SHA-256
          • L = 3072, N = 256 SHA: SHA-1, SHA-224, SHA-256
        • KeyPair:
          • L = 2048, N = 224
          • L = 2048, N = 256
          • L = 3072, N = 256
        • Prerequisite: SHS #2565, RNG #1318, DRBG #614