Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Version
1.0.1
Type
SOFTWARE
Vendor
Ixia, a Keysight Business
8310 N Capital of Texas Hwy
Austin, TX 78731
United States
Contacts
Fred Strelzoff
fred.strelzoff@keysight.com
(512) 600-5400

HMAC 3915

   First Validated: 11/9/2018
Operating Environment Algorithm Capabilities
Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA-1 Expand
Linux 4.12.0 on Intel Core i7-3555LE Expand
    HMAC-SHA-1 Expand
    Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-224 Expand
    Linux 4.12.0 on Intel Core i7-3555LE Expand
      HMAC-SHA2-224 Expand
      Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-256 Expand
      Linux 4.12.0 on Intel Core i7-3555LE Expand
        HMAC-SHA2-256 Expand
        Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-384 Expand
        Linux 4.12.0 on Intel Core i7-3555LE Expand
          HMAC-SHA2-384 Expand
          Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-512 Expand
          Linux 4.12.0 on Intel Core i7-3555LE Expand
            HMAC-SHA2-512 Expand
            Linux 4.12.0 on Intel Core i7-3555LE Expand
              HMAC-SHA2-512/224 Expand
              Linux 4.12.0 on Intel Core i7-3555LE Expand
                HMAC-SHA2-512/256 Expand

                Created October 05, 2016, Updated April 03, 2025