Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program CAVP

Description
Cryptographic library for Check Point Next Generation Security Appliances
Version
1.0
Type
FIRMWARE
Vendor
Check Point Software Technologies
5 Ha'solelim Street
Tel Aviv 67897
Israel
Contacts
Malcolm Levy
product_certifications@checkpoint.com
+972-37534561

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C576
3/22/2019
  • 4th Generation Intel® Coreā„¢ i5
    • processor
  • Intel® Atom® C Series
    • processor
      • manufacturer: Intel
  • Intel® Celeron® G Series
    • processor
      • manufacturer: Intel
  • Intel® Pentium® G Series
    • processor
      • manufacturer: Intel
  • Intel® Xeon®
    • processor
      • manufacturer: Intel
  • Intel® Xeon® E3 Family
    • processor
      • manufacturer: Intel
  • Intel® Xeon® E5 v2 Family w/ Check Point GAiA OS R80.30 on VMWare ESX 6.0.0
    • processor
      • manufacturer: Intel
  • Intel® Xeon® E5 v3 Family
    • processor
      • manufacturer: Intel
  • Intel® Xeon® E5 v4 Family
    • processor
      • manufacturer: Intel
  • Intel® Xeon® Scalable
    • processor
      • manufacturer: Intel
  • Intel® Xeon® w/ Check Point GAiA OS R80.30 on VMWare ESX 6.0.0
    • processor
      • manufacturer: Intel
  • ECDSA SigGen (186-4)
    • Component
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-512
    Prerequisites:
Created October 05, 2016, Updated June 22, 2020