Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
Provides cryptogaphic operations by performing reliable, high speed security services for Mobile Armor Data Protection for Full Disk Encryption of laptops, PCs and smartphones, and the encryption of files, folders and removable media on those devices.
Version
3.0
Type
SOFTWARE
Vendor
Mobile Armor, Inc.
400 South Mills Wood Rd
Suite 300
Chesterfield, MO 63017
USA
Contacts
Brian Wood
wood@mobilearmor.com
443-468-1238
Fax: 314-590-0995

SHS 818

   First Validated: 7/11/2008
Operating Environment Algorithm Capabilities
Apple OS X 10.5 on Intel Core 2 Duo SHA-1 Expand
Fedora Core 8 on Intel Core 2 Duo SHA-1 Expand
Microsoft Windows 2000 on Intel Pentium D SHA-1 Expand
Microsoft Windows Mobile 6 on ARM SHA-1 Expand
Microsoft Windows Vista on Intel Core 2 Duo SHA-1 Expand
Microsoft Windows XP on Intel Pentium D SHA-1 Expand
Palm OS 5.4 on Intel Xscale SHA-1 Expand
Red Hat Linux Enterprise 5.1 on Intel Core 2 Duo SHA-1 Expand
SUSE 10 on Intel Core 2 Duo SHA-1 Expand
Ubuntu 7.10 on Intel Core 2 Duo SHA-1 Expand
Apple OS X 10.5 on Intel Core 2 Duo SHA2-224 Expand
Fedora Core 8 on Intel Core 2 Duo SHA2-224 Expand
Microsoft Windows 2000 on Intel Pentium D SHA2-224 Expand
Microsoft Windows Mobile 6 on ARM SHA2-224 Expand
Microsoft Windows Vista on Intel Core 2 Duo SHA2-224 Expand
Microsoft Windows XP on Intel Pentium D SHA2-224 Expand
Palm OS 5.4 on Intel Xscale SHA2-224 Expand
Red Hat Linux Enterprise 5.1 on Intel Core 2 Duo SHA2-224 Expand
SUSE 10 on Intel Core 2 Duo SHA2-224 Expand
Ubuntu 7.10 on Intel Core 2 Duo SHA2-224 Expand
Apple OS X 10.5 on Intel Core 2 Duo SHA2-256 Expand
Fedora Core 8 on Intel Core 2 Duo SHA2-256 Expand
Microsoft Windows 2000 on Intel Pentium D SHA2-256 Expand
Microsoft Windows Mobile 6 on ARM SHA2-256 Expand
Microsoft Windows Vista on Intel Core 2 Duo SHA2-256 Expand
Microsoft Windows XP on Intel Pentium D SHA2-256 Expand
Palm OS 5.4 on Intel Xscale SHA2-256 Expand
Red Hat Linux Enterprise 5.1 on Intel Core 2 Duo SHA2-256 Expand
SUSE 10 on Intel Core 2 Duo SHA2-256 Expand
Ubuntu 7.10 on Intel Core 2 Duo SHA2-256 Expand
Apple OS X 10.5 on Intel Core 2 Duo SHA2-384 Expand
Fedora Core 8 on Intel Core 2 Duo SHA2-384 Expand
Microsoft Windows 2000 on Intel Pentium D SHA2-384 Expand
Microsoft Windows Mobile 6 on ARM SHA2-384 Expand
Microsoft Windows Vista on Intel Core 2 Duo SHA2-384 Expand
Microsoft Windows XP on Intel Pentium D SHA2-384 Expand
Palm OS 5.4 on Intel Xscale SHA2-384 Expand
Red Hat Linux Enterprise 5.1 on Intel Core 2 Duo SHA2-384 Expand
SUSE 10 on Intel Core 2 Duo SHA2-384 Expand
Ubuntu 7.10 on Intel Core 2 Duo SHA2-384 Expand
Apple OS X 10.5 on Intel Core 2 Duo SHA2-512 Expand
Fedora Core 8 on Intel Core 2 Duo SHA2-512 Expand
Microsoft Windows 2000 on Intel Pentium D SHA2-512 Expand
Microsoft Windows Mobile 6 on ARM SHA2-512 Expand
Microsoft Windows Vista on Intel Core 2 Duo SHA2-512 Expand
Microsoft Windows XP on Intel Pentium D SHA2-512 Expand
Palm OS 5.4 on Intel Xscale SHA2-512 Expand
Red Hat Linux Enterprise 5.1 on Intel Core 2 Duo SHA2-512 Expand
SUSE 10 on Intel Core 2 Duo SHA2-512 Expand
Ubuntu 7.10 on Intel Core 2 Duo SHA2-512 Expand

Created October 05, 2016, Updated March 07, 2024