Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network.
Version
5.3
Type
SOFTWARE
Vendor
IBM Internet Security Systems
6303 Barfield Road
Atlanta, GA 30328
USA
Contacts
Ferrell Moultrie
fmoultrie@us.ibm.com
(678) 234-4069
Kim Barnes
kcbarnes@us.ibm.com
(404) 238-6024

ECDSA 643

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA KeyGen (FIPS186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA KeyVer (FIPS186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA SigGen (FIPS186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA SigVer (FIPS186-4) Expand

SHS 2743

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA2-224 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA2-256 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA2-384 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA2-512 Expand

HMAC 2102

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA-1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-224 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-256 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-384 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-512 Expand

TDES 1886

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-CBC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-CFB64 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-ECB Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-OFB Expand

AES 3310

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CBC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CCM Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB128 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB8 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CMAC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CTR Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-ECB Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-GCM Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-GMAC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-OFB Expand

RSA 1694

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA KeyGen (FIPS186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigGen (FIPS186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigVer (FIPS186-2) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigVer (FIPS186-4) Expand

DRBG 759

   First Validated: 3/27/2015
Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 Counter DRBG Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 Hash DRBG Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC DRBG Expand

Created October 05, 2016, Updated March 16, 2023