Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

drbg Validation List

This list identifies implementations that have been validated as conforming to the Deterministic Random Bit Generator (DRBG) Algorithm, as specified in Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, using tests described in the DRBG Validation Suite (DRBGVS).

As of June 2015, in accordance with SP800-90A Revision 1, and November 2015, in accordance with SP800-131A Revision 1, the use of Dual_EC_DRBG is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2277Blue Cedar
325 Pacific Avenue
San Francisco, CA 94111
USA

FIPS Admin
fips@bluecedar.com
415-329-0401

Blue Cedar Cryptographic Module

2.0.16


The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Nvidia Tegra X1 with PAA w/ Android 8.1
    • Nvidia Tegra X1 without PAA w/ Android 8.1
    • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
    • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5644
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4526
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3759
2276Q Core Medical Ltd.
29 Yad Harutsim St.
Netanya 4250529
Israel

Nimrod Schweitzer
nimrod.schweitzer@gcore.com
+972-73-2388839
Fax: +972-73-2388800

Lee Aydelotte
laydelotte@silexamerica.com
801-676-8673
Fax: 714-258-0730

QCore OpenSSL FIPS Object Module 2.0.9

2.0.9


QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

    • NXP i.MX280 ARM w/ Linux 2.6.35
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5643
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4525
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3758
2275Sony Imaging Products & Solutions Inc.
1-7-1 Konan
Minato-ku, Tokyo 108-0075
JAPAN

Toshiaki Ouchi
sips-pssg-b2b-fipsinfo@sony.com
+81 50 3140 9893

Hirokazu Morishita
sips-pssg-b2b-fipsinfo@sony.com
+81 50 3140 1739

Sony IMB DRBG Core-SH

1.0.0 (Firmware)


Sony IMB DRBG Core-SH is the firmware module for digital cinema system.

    • Renesas Electronics Corporation SH7724
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4522
2274Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shassse3 Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4521
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3755
2273Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shagen Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4520
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3754
2272Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shaavx2 Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4519
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3753
2271Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shaavx Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4518
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3752
2270Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesni Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5635
2269Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesgen Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5634
2268Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesasm Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5631
2267Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesni Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5630
2266Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shassse3 Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4517
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3751
2265Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shagen Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4516
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3750
2264Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shaavx2 Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4515
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3749
2263Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shaavx Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4514
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3748
2262Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesni Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5627
2261Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesgen Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5624
2260Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesasm Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
8/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5621
2259Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shagen Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4513
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3747
2258Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shassse3 Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4512
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3746
2257Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shaavx2 Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4511
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3745
2256Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK shaavx Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4510
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3744
2255Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesgen Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5617
2254Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 UEK aesasm Implementation

R6-1.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
8/2/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5614
2253Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

66005f41fbc3529ffe8d007708756720529da20d


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • POWER9 with PAA w/ Ubuntu Linux 18.04
    • POWER9 without PAA w/ Ubuntu Linux 18.04
    • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
    • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
8/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5612
2252Feitian Technologies Co., Ltd.
Floor 17, Tower B, Huizhi Mansion
No.9 Xueqing Road
Haidian, Beijing 100085
China

Mr. PENG Jie
pengjie@ftsafe.com
+8610 62304466ext419
Fax: +8610 62304477

Mr. JU Wensheng
wensheng@ftsafe.com
+8610 62304466ext527
Fax: +8610 62304477

Feitian-FIPS-COS Hardware Cryptographic Library

1.0 (Firmware)


The Feitian-FIPS-COS Hardware Cryptographic Library provides cryptographic algorithm support to the Feitian-FIPS-COS cryptographic module.

    • ST23YT66
8/2/2018
  • Counter:
    • Modes: 3KeyTDEA
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: TDES #2824
2251BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 8.0.1 on Venturi KT960 Tablet
8/2/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5609
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4506
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3742
2250BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
8/2/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5608
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4505
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3741
2249Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.2R1 QuickSec-MX104

Junos OS 18.2R1 (Firmware)


MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

    • Freescale P5021
8/2/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3739
2248Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.2R1 OpenSSL-MX104

Junos OS 18.2R1 (Firmware)


MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

    • Freescale P5021
8/2/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3738
2247Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.2R1 MX104-Kernel

Junos OS 18.2R1 (Firmware)


MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

    • Freescale P5021
8/2/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3736
2246Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4499
2245Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4498
2244Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

3218c1db82718a54e4d41de493d006eaa3ba445c


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • POWER9 with PAA w/ Ubuntu Linux 18.04
    • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
    • POWER9 without PAA w/ Ubuntu Linux 18.04
7/27/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5598
2243Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shassse3) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4495
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3732
2242Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shagen) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4494
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3731
2241Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shaavx2) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4493
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3730
2240Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shaavx) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4492
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3729
2239Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesni) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5594
2238Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesgen) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5592
2237Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesasm) - generic CPU

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5590
2236Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4491
2235Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5586
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4490
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3727
2234Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4489
2233Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5584
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4488
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3725
2232Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5583
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4487
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3724
2231Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5582
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4486
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3723
2230Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5581
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4485
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3722
2229Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5580
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4484
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3721
2228Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5579
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4483
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3720
2227Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5578
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4482
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3719
2226Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5577
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4481
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3718
2225Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5576
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4480
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3717
2224Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Bob Van Andel
bva@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Loren Shade
loren@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Allegro Cryptographic Engine using the EYL QRNG

6.31


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4478
2223Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Bob Van Andel
bva@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Loren Shade
loren@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Allegro Cryptographic Engine

6.31


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
    • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
7/27/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4477
2222Secure-IC
15 Rue Claude Chappe
Bât. B ZAC des Champs Blancs
Cesson-Sévigné, N.A 35510
France

karine lorvellec
karine.lorvellec@secure-ic.com
+33 2 99 12 18 72

florent lozach
florent.lozach@secure-ic.com
+33 2 99 12 18 72

Secure-IC's hardware True Random Number Generator

2.0


Secure-IC''s hardware True Random Number Generator produces a high quality stream of random data. It embeds a fully digital entropy source that provides seeds for an internal DRBG that strictly follows SP800-90A requirements. The whole system delivers random data to be used by various applications, including secure schemes.

    • N/A
7/27/2018
  • Counter:
    • Modes: AES-128
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5572
2221Entrust Datacard Corporation
Two Lincoln Centre
5420 LBJ Freeway Suite 300
Dallas, TX 75240
USA

John Gray
John.Gray@entrustdatacard.com

John Mahoney
John.Mahoney@entrustdatacard.com

Entrust Authority™ Security Toolkit for the Java® Platform DRBG 1.0

1.0


The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

    • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
7/20/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-512
    • Prerequisite: SHS #4475
2220HP Inc.
11311 Chinden Blvd
Boise, Idaho 83714-0021
USA

Gerardo Colunga
gerardo.del.colunga@hp.com
208-333-5607

Chris Gunning
chris.gunning@hp.com
208-333-6785

HP FutureSmart QuickSec

5.1 (Firmware)


HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

    • Arm Cortex-A8
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5567
2219Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Windows 10 rs3 32 bits
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5566
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3710
2218Curtiss-Wright Controls, Inc.
2600 Paramount Place, Suite 200
Fairborn, OH 45324
USA

Paul Davis
pdavis@curtisswright.com
937-252-5601 x 1363
Fax: 937-252-2729

Rich Langley
rlangley@curtisswright.com
937-610-5455
Fax: 937-252-1465

Curtiss-Wright Controls SW libgcrypt

5.0


The libgcrypt software implementation provides cryptographic functionality supporting the CentOS operating system.

    • Intel Atom E3845 w/ CentOS 7.5
    • Intel Core i5-4402E w/ CentOS 7.5
7/20/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3709
2217HP Inc.
11311 Chinden Blvd
Boise, Idaho 83714-0021
USA

Gerardo Colunga
gerardo.del.colunga@hp.com
208-333-5607

Chris Gunning
chris.gunning@hp.com
208-333-6785

HP FutureSmart OpenSSL FIPS Object Module

2.0.4 (Firmware)


HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

    • Arm Cortex-A8
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5563
2216Nutanix
1740 Technology Drive, Suite 150
San Jose, CA 95110
USA

Eric Hammersley
fips@nutanix.com

Ashutosh Pangasa
fips@nutanix.com

Nutanix Cryptographic Library for OpenSSL

1.0


The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

    • Intel E5-2620 w/PAA w/ CentOS 7.4
7/20/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5562
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4465
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3708
2215Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • AMD Ryzen5 w/ Windows 2016 64 bits
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5560
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3707
2214Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Windows 10 rs3 64 bits
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5559
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3706
2213Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Mac OS 10.13
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5558
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3705
2212Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ CentOS 7.4 64 bits
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5557
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3704
2211Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
7/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5556
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3703
2210Elster GmbH
Strothweg 1
Lotte (Buren) 49504
Germany

Michael Habermann
michael.habermann@honeywell.com
+49-541-1214-215
Fax: +49-541-1214-595

Markus Bölter
markus.boelter@honeywell.com
+49-541-1214-114
Fax: +49-541-1214-595

elster_cv

02.02.01 (Firmware)


elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

    • STM32L152RE
7/20/2018
  • Counter:
    • Modes: AES-128
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5555
2209Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0 (Firmware)


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • Intel Atom C Series
    • P2020
    • P2041
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5554
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4457
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3702
2208International Business Machines
1702 North Street
Building 256-3
Endicott, NY 13760
USA

Brian W. Hugenbruch
bwhugen@us.ibm.com
607-429-3660

IBM z/VM System SSL

V6.4


z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

    • IBM z13 w/ IBM z/VM V6.4
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-512
    • Prerequisite: SHS #4456
2207SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply Server Engine

2.1


SafeLogic''s CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5552
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4455
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3700
2206Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shassse3)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4454
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3699
2205Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shagen)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4453
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3698
2204Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shaavx2)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4452
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3697
2203Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (shaavx)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4451
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3696
2202Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesni)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5548
2201Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesgen)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5546
2200Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Linux Kernel crypto API (aesasm)

6.0


Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5545
2199Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat OpenSSL (64bit)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5544
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4450
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3695
2198Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat NSS Softoken (64bit)

5.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4449
2197Geotab Inc.
2440 Winston Park Drive
Oakville, Ontario L6H 7V2
Canada

Alex Sukhov
embeddedsecurity@geotab.com

Geotab Cryptographic Module

1.0 (Firmware)


Geotab Cryptographic Module provides a library of functions to perform general purpose cryptographic services.

    • NXP S32K14X
    • Microchip DSPIC33E
7/13/2018
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3693
2196Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • P2020 w/ CentOS 5.8
    • P2041 w/ CentOS 5.8
    • Intel Atom C Series w/ CentOS 6.6
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5541
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4447
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3692
2195Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Allen Ting
yting@juniper.net
408-858-5008

Mounir Hahad
mhahad@juniper.net

CryptoCore

1.0


Cryptographic module to support the cryptographic functionalities for Juniper products.

    • Intel Core i5 w/ Ubuntu Linux 14.04
    • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
    • Intel Xeon E5 family w/ Ubuntu Linux 14.04
7/13/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5540
2194BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
    • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
    • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
    • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
7/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5539
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4445
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3690
2193Konica Minolta, Inc.
2970, Ishikawa-machi
Hachioji-shi, Tokyo 192-8505
Japan

R&D Administration Division, R&D Headquarters Business Techn

Konica Minolta PP Crypto Library

1.1 Rev.1 (Firmware)


Konica Minolta PP Crypto Library is used in AccurioPress C2060/C2070, AccurioPrint C2060L and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

    • Intel(R) Core(TM) i5-4570S
    • Intel(R) Pentium G3420
7/13/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3689
2192Infosec Global Inc.
2225 Sheppard Avenue East
Suite 1402
Toronto, Ontario M2J 5C2
Canada

Brian Neill
brian.neill@infosecglobal.com
416-492-3333
Fax: 647-343-6933

Ian Laidlaw
ian.laidlaw@infosecglobal.com
416-492-3333
Fax: 647-343-6933

AgileSec FIPS Provider 1.0

1.0


AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Core i5 CPU with AES-NI w/ OSX 10.12
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Intel Core i5 CPU without AES-NI w/ OSX 10.12
    • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
7/13/2018
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3686
2191Accellion, Inc.
1804 Embarcadero Road
Suite 200
Palo Alto, Ca 94303
USA

Frank Balonis
frank.balonis@accellion.com
650-485-4300

Sim Han Seah
hanseah@accellion.com
+65 6244 5678

Accellion Cryptographic Module

2.0.16


The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ CentOS 6
    • Intel Xeon E5 with PAA w/ CentOS 6
7/6/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5533
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4440
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3685
2190SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply for Java

3.0.1


SafeLogic''s CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
    • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
7/6/2018
  • Counter:
    • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5532, TDES #2785
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4439
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3684
2189Virtual Instruments
2331 Zanker Road
San Jose, CA 95131
USA

Susanta Pattanayak
Susanta.pattanayak@virtualinstruments.com
+1 408 579 4000

Jay Nitikman
Jay.nitikman@virtualinstruments.com
+1 408 579 4000

Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

v5.7 (Firmware)


The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

    • Intel Broadwell Xeon without AES-NI
6/29/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5528
2188Cisco Systems, Inc.
170 W. Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Adaptive Security Appliance (ASA)

9.6


The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

    • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
6/29/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-512
    • Prerequisite: SHS #4435
2187Harris Corporation
1680 University Avenue
Rochester, NY 14610
USA

Chris Wood
cwood06@harris.com
585-720-8730
Fax: 585-241-8459

Esther Betancourt
ebetanco@harris.com
585-242-3635
Fax: 585-241-8459

Harris Broadband Ethernet Radio GPP Cryptographic Library

6.0 (Firmware)


This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

    • Broadcom XLS108
6/29/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-256
    • Prerequisite: SHS #4434
2186Broadcom Limited
1320 Ridder Park Drive
San Jose, CA 95131
USA

Avinash Mahajan
(408) 433-7461

Secr_trng_800_90ab_vc1

1.0 (Firmware)


Low power hardware implementation of cryptographically secure random number generator. It contains a CTR based DRBG which conforms to SP800-90A and an entropy source with built-in entropy testing which conforms to SP800-90B.

    • Synopsys VCS 2017.03-SP2
6/29/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #3913
2185Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(650) 265-4200
Fax: (408) 738-2065

Mukunda Chikkeralli
+91 80 49134180

Ruckus Smartzone Controller Java Crypto Library

1.0


The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

    • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
    • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
6/29/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4375
2184Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Ingrid Barker
ibarker@juniper.net

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

18.1R1 - OpenSSL

18.1R1 (Firmware)


The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E312xx Sandy Bridge
6/29/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3677
2183Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - OpenSSL

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
6/29/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3676
2182Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Ingrid Barker
ibarker@juniper.net

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

18.1R1 - Kernel

18.1R1 (Firmware)


The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E312xx Sandy Bridge
6/29/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3674
2181Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (3305)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon E5
6/29/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5513
2180Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (2101)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon D
6/29/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5512
2179Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (1101)

6.4.1.20056.fips.7 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Pentium D
6/29/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5511
2178Virtual Instruments
2331 Zanker Road
San Jose, CA 95131
USA

Susanta Pattanayak
Susanta.pattanayak@virtualinstruments.com
+1 408 579 4000

Jay Nitikman
Jay.nitikman@virtualinstruments.com
+1 408 579 4000

Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

v5.7 (Firmware)


The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

    • Intel Broadwell Xeon with AES-NI
6/22/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5508
2177Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1-S4 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
6/22/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3665
2176Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Kernel - EX4300

Junos OS 17.4 R1-S4 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
6/22/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3664
2175Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shaavx Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/22/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4418
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3662
2174Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shamb Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/22/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4417
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3661
2173Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 RE1800 - OpenSSL

Junos OS 18.1R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/22/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3657
2172Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 RE1800 - Quicksec

Junos OS 18.1R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/22/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3655
2171Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 RE1800 - Kernel

Junos OS 18.1R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/15/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3653
2170Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 17.4R1-S1 RE1800-Quicksec

Junos OS 17.4 R1-S1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/15/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3652
2169Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 17.4R1-S1 RE1800-OpenSSL

Junos OS 17.4 R1-S1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/15/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3650
2168Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 17.4R1-S1 RE1800-Kernel

Junos OS 17.4 R1-S1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/15/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3648
2167Silvus Technologies
10990 Wilshire Blvd.
STE 1500
Los Angeles, CA 90024
USA

Ajit Warrier
ajit@silvustechnologies.com
310-479-3333 ext 41
Fax: 310-479-2225

Weijun Zhu
weijun@silvustechnologies.com
310-479-3333 ext 27
Fax: 310-479-2225

Silvus Crypto Module

3.15.1 (Firmware)


The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

    • Xilinx Zynq-7000
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5496
2166Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shaavx2 Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/15/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4405
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3646
2165Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesni Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/15/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5492
2164Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesgen Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/15/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5490
2163Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesasm Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
6/15/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5488
2162CyberArk Software Ltd.
9 Hapsagot St. Park Ofer 2
P.O.B. 3143
Petach-Tikva 4951040
Israel

Yariv Oren
yariv.oren@gmail.com
+972-3-918-0000x2258
Fax: +972-3-924-0111

Elad Moshe
elad.moshe@cyberark.com
+972-3-918-0000x2378
Fax: +972-3-924-0111

CyberArk Privileged Account Security Cryptographic Library for Windows

1.0


The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

    • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5487
2161CyberArk Software Ltd.
9 Hapsagot St. Park Ofer 2
P.O.B. 3143
Petach-Tikva 4951040
Israel

Yariv Oren
yariv.oren@gmail.com
+972-3-918-0000x2258
Fax: +972-3-924-0111

Elad Moshe
elad.moshe@cyberark.com
+972-3-918-0000x2378
Fax: +972-3-924-0111

CyberArk Privileged Account Security Cryptographic Library for Linux

1.0


The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

    • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5486
2160Securosys SA
Forrlibuckstrasse 70
Zurich, Zurich 8005
Switzerland

Marcel Dasen
dasen@securosys.ch
+41 44 552 31 33

Robert Rogenmoser
roro@securosys.ch
+41 44 552 31 11

Primus HSM Cryptographic Library

XC7K160T 2.5.3 (Firmware)


Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

    • Marvell Armada XP PJ4Bv7
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5485
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-512
    • Prerequisite: HMAC #3643
2159Trend Micro Inc.
11305 Alterra Parkway
Austin, TX 78758
USA

Paul Tucker
paul_tucker@trendmicro.com
512-633-7945

Trend Micro, TippingPoint Crypto Core OpenSSL

2.0.13


The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

    • Intel Core i3 without AES-NI w/ Linux 4.4
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
    • Intel Xeon E5 with AES-NI w/ Linux 4.4
6/15/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5484
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4401
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3640
2158Arista Networks Inc.
5453 Great America Pkwy
Santa Clara, CA 95054
USA

Richard Whitney
rw@arista.com
703-627-6092
Fax: 408-538-8920

Ethan Rahn
erahn@arista.com
408-547-5825

EOS MACsec Hybrid Firmware v1.0

1.0 (Firmware)


The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

    • Intel Xeon E3
    • AMD GX Series
    • Intel Pentium B9
    • Intel Xeon D-1500
    • AMD GE Series
6/15/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5482
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4399
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3636
2157Pure Storage, Inc.
650 Castro Street
Suite 400
Mountain View, CA 94041
USA

John Fuchigami
jfuchigami@purestorage.com
800-379-7873

Ram Lakshminarayanan
rlakshminarayanan@purestorage.com
800-379-7873

Flash Array Crypto Library

1.2.0


Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel Xeon x64 CPU with AES-NI (E5 Family) w/ Purity 5
    • Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold) w/ Purity 5
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5480
2156DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

TBD
TBD
TBD

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • SH7757 w/ Linux 3.16.47
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5478
2155DELL, Inc.
One Dell Way
Round Rock, Texas 78682
USA

TBD
TBD
TBD

Dell Crypto Library for Dell iDRAC and Dell CMC

2.4


The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

    • 440EPX w/ Linux 4.9.31
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5477
2154ViaSat, Inc.
6155 El Camino Real
Carlsbad, CA 92009
USA

David Suksumrit
david.suksumrit@viasat.com
760-476-2200
Fax: 760-929-3941

Lorenzo Page
lorenzo.page@viasat.com
760-893-4198

EbemCrypto

13 (Firmware)


Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat''s Enhanced Bandwidth Efficient Modem (EBEM).

    • IBM PowerPC 405GPr
6/15/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5475
2153Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • PPCe500
    • Intel Xeon w/ ESXI 6.0
6/8/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5474
2152Renesas Electronics America Inc.
1001 Murphy Ranch Road
Milpitas, CA 95035
USA

Mark Schaeffer
mark.schaeffer@renesas.com
408-588-5529

Nick Mori
Nick.mori@renesas.com
408-588-6621

Synergy HW DRBG for Synergy S5 and S7 series MCU devices

Secure Crypto Engine 7


The Secure Crypto Engine provides a variety of cryptographic services with hardware acceleration that is strictly managed within the security enclave.

    • N/A
6/8/2018
  • Counter:
    • Modes: AES-128
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5384
2151Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 NSS without AES-NI

R6-1.0.0


Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
6/8/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4391
2150Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(650) 265-4200
Fax: (408) 738-2065

Mukunda Chikkeralli
+91 80 49134180

Ruckus Smartzone Controller Java Crypto Library

1.0 (Firmware)


The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

    • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
    • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
6/8/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4351
2149Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Brian Wood
be.wood@samsung.com
+1-973-440-9125

Samsung BoringSSL Cryptographic Module

v1.2.1


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Qualcomm SDM845 w/ Android 8.1
    • Samsung Electronics Exynos 9810 w/ Android 8.1
    • Qualcomm MSM8998 w/ Android 8.1
    • Qualcomm SDM450 w/ Android 8.1
6/8/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5468
2148Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.1R1 MTRE-QuickSec

Junos OS 18.1R1 (Firmware)


Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

    • Intel Xeon CPU E5
6/8/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3625
2147Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.1R1 MTRE-OpenSSL

Junos OS 18.1R1 (Firmware)


Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

    • Intel Xeon CPU E5
6/8/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3624
2146Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.1R1 MTRE-Kernel

Junos OS 18.1R1 (Firmware)


Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

    • Intel Xeon CPU E5
6/8/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3623
2145Futurex
864 Old Boerne Road
Bulverde, TX 78163
USA

Futurex Security Certifications
certifications@futurex.com
830-980-9782

Futurex Cryptographic Engine

6.2.0.1 (Firmware)


The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

    • TI AM3352
6/8/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5464
2144SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5 for TZ, NSA and SuperMassive

6.5.2 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN62XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon II (CN68XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon III (CN71XX)
6/8/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4383
2143Hitachi, Ltd.
322-2 Nakazato
Odawara-shi, Kanagawa-ken 250-0872
Japan

Hitachi, Ltd. Block Storage System Development Dept.

Hitachi Flash Module Drive HDE Encryption Engine

1CK658 and PM8607B1-F3EI J0J0 (Firmware)


Hitachi Flash Module Drive HDE Encryption Engine provides the cryptographic functionality found in Hitachi Flash Module Drive HDE.

    • 1CK658 and PM8607B1-F3EI
6/1/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4382
2142Juniper Networks, Inc
1133 Innovation Way
Sunnyvale, California 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 QFX10K-OpenSSL

Junos OS 18.1R1 (Firmware)


The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

    • Intel Xeon E3
6/1/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3617
2141Juniper Networks, Inc
1133 Innovation Way
Sunnyvale, California 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 QFX10K-Kernel

Junos OS 18.1R1 (Firmware)


The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

    • Intel Xeon E3
6/1/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3615
2140REDCOM Laboratories, Inc
One REDCOM Center
Victor, NY 14564-0995
United States

Sal Ceravolo
Sal.ceravolo@redcom.com
585-905-0451

Chris Hasenauer
Chris.hasenauer@redcom.com
585-905-0451

REDCOM Encryption 140-2

3.0.1


REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

    • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
    • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
6/1/2018
  • Counter:
    • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5457, TDES #2744
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4377
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3614
2139Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2001

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2001

Junos OS 18.1R1 QuickSec

Junos OS 18.1R1 (Firmware)


The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

    • Intel(R) Xeon(R) CPU E5
5/25/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3613
2138Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2001

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2001

Junos OS 18.1R1 OpenSSL

Junos OS 18.1R1 (Firmware)


The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

    • Intel(R) Xeon(R) CPU E5
5/25/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3612
2137KeyNexus, Inc.
205-2657 Wilfert Road
Victoria, BC V9B6A7
Canada

Jason Novecosky
jason@keynexus.net

KeyNexus Cryptographic Library

1.0


The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

    • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
5/25/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5453
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4373
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3611
2136Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2001

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2001

Junos OS 18.1R1 Kernel

Junos OS 18.1R1 (Firmware)


The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

    • Intel(R) Xeon(R) CPU E5
5/25/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3609
2135Hypersecu Information System Inc
#206-6191 Westminster Hwy
Richmond, BC V7C 4V4
Canada

James Li
james@hypersecu.com
(604) 279-2000
Fax: (604) 272-1233

HYP ALG Library

V1.0 (Firmware)


The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

    • HSC32K1
5/25/2018
  • Counter:
    • Modes: 3KeyTDEA
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: TDES #2740
2134Taisys Technologies Co. Ltd.
7F., No.56, Lane 321
Yangguang St., Neihu Dist.
Taipei, Taipei 11491
Taiwan (R.O.C.)

Joe Wang
joe.wang@taisys.com
+886-2-26270927x6699
Fax: +886-2-26270619

Kent Horng
kent.horng@taisys.com
+886-2-26562185 #206
Fax: +886-2-26579657

TAISYS JUISE-S2-NESLIB

32 53 (Firmware)


The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

    • SC300
5/25/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4369
2133DocuSign, Inc.
221 Main St.
Suite 1000
San Francisco, CA 94105
USA

Ezer Farhi
Ezer.Farhi@docusign.com
972-3-9279529

DocuSign-SA-Main

8.51.9.0 (Firmware)


DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

    • Intel® Xeon Quad-Core
5/25/2018
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3606
2132wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Kaleb Himes
kaleb@wolfssl.com

wolfCrypt

3.14.2


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Xeon® E5-2650 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on Microsoft Hyper-V 2016 Core Linux Kernel 4.4
    • Intel® Xeon® E5-2403 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on VMWare ESXi 6.5.0 Linux Kernel 4.4
5/25/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4366
2121Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
tbd

CiscoSSL FIPS Object Module

6.0


The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

    • Apple A10 w/ iOS 11.x
5/25/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5434
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4357
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3608
2131wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

4.0


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4365
2130IBM
2455 South Rd
Poughkeepsie, NY 12601
USA

Thomas Morris Jr
tmorrisj@us.ibm.com
845-435-5538

William Santiago
wsf1@us.ibm.com
845-435-9265

Miniboot 6.63 with 00CW683

Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


Miniboot Implemented Algorithms with hardware acceleration

    • IBM PowerPC 405
5/18/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #4815
2129Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Petra Manche
+44 1189 245470

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle OpenSSL FIPS Object Module

OpenSSL_2.0.13_OracleFIPS_1.0


Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

    • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
    • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
    • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
    • SPARC S7 with PAA w/ Oracle Solaris 11.4
    • SPARC S7 without PAA w/ Oracle Solaris 11.4
    • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
    • Intel Xeon E5 with PAA w/ Solaris 11.4
    • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
    • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
5/18/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5445
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4364
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3603
2128Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shamb Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4363
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3602
2127Unbound Tech
25 Efal Street
Petah Tikva
Israel

Unbound Tech
contact@unboundtech.com
631-316-8114

OpenSSL

FIPS 2.0.16


This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
5/18/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5443
2126Unbound Tech
25 Efal Street
Petah Tikva
Israel

Unbound Tech
contact@unboundtech.com
631-316-8114

UnBound EKM DRBG

2.0.1801.22535


This component is used for secure random bit generation, as an alternative to the OpenSSL DRBG.

    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Xeon E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
5/18/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5443
2125Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Robert Truesdell
rtruesdell@splunk.com
412.913.8242

Splunk Phantom Cryptographic Library

1.0


The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

    • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
    • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
5/18/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5442
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4361
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3599
2124Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4360
2123Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

    • n/a
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4359
2122Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4358
2120Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

CC3235S 4.0.0.5 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

    • na
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4355
2119Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

CC3235SF 4.0.0.5 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • na
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4356
2118Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

CC3135R 4.0.0.5 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • na
5/18/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4354
2117Cohesity, Inc.
300 Park Ave
Suite 800
San Jose, CA 95110
USA

Vivek Agarwal
vivek@cohesity.com
+1 (415) 690-7805

Cohesity OpenSSL FIPS Object Module

1.0.2


The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

    • Intel Xeon with AES-NI w/ CentOS 7
    • Intel Xeon without AES-NI w/ CentOS 7
5/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5426
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4353
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3591
2116Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shaavx Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/10/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4352
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3590
2115Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
+1 (628)-400-2043

SDKMS Crypto Library

1.0.0 (Firmware)


Fortanix Self-Defending Key Management Service (SDKMS) is the world''s first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

    • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
5/10/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5282
2114Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Kevin Meagher
kmeagher@ciena.com
1-410-865-8936

OpenSSL FIPS Object Module

2.0.12


Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

    • Intel Xeon D-1500 w/ SAOS 8.6.1
    • AARCH64(arm) w/ SAOS 6.17
    • Cavium 52xx w/ SAOS 6.17
    • ARMv7 w/ SAOS 6.17
5/10/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5419
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3589
2113NIKSUN, Inc.
457 N. Harrison St.
3rd Floor
Princeton, NJ 08540
USA

Darryle Merlette
merlette@niksun.com

NIKOS FIPS Object Module

2.0.16


The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN''s networking products.

    • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
5/10/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5418
2112LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Donghoon Shin
hoon.shin@lge.com
82-10-2280-4056

LG BoringSSL

3.0


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

    • Snapdragon 845 (SDM845) w/ Android 8.0
    • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
    • Snapdragon 835 (MSM8998) w/ Android 8.0
5/10/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5417
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4348
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3587
2111Unisys Corporation
3199 Pilot Knob Road
Eagan, MN 55121
USA

James Heit
james.heit@unisys.com
651-635-7739

Brian Wegleitner
brian.wegleitner@unisys.com
651-635-7548

OS 2200 Cryptographic Library

2.0


General purpose cryptographic software library.

    • Unisys 2200 w/ OS 2200 Operating System
5/4/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-512
    • Prerequisite: SHS #4347
2110Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shassse3 Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/4/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: SHS #4346
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-512
    • Prerequisite: HMAC #3586
2109INFINIDAT
500 Totten Pond Road
Waltham, MA 02451
USA

David Hebert
davidh@infinidat.com
+1 860-214-5666

Steve Sullivan
steves@infinidat.com
+1 781-264-1544

INFINIDAT Cryptographic Module (libcrypto)

1.0.2k


The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

    • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
5/4/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5414
2108Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL VPAES and SHA1 SSSE3

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
5/4/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5351
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4302
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3548
2107Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shagen Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4342
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3583
2106Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI shaavx2 Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4341
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3582
2105Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesni Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5409
2104Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesgen Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5408
2103Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 KCAPI aesasm Implementation

R7-2.0.0


Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5407
2102Fortinet Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

Alan Kaye
akaye@fortinet.com
613-225-9381 x7416
Fax: 613-225-9951

Fortinet FortiGate-VM RBG Cryptographic Library v5.4

5.4


This document focuses on the software implementation of the Fortinet FortiGate-VM RBG Cryptographic Library v5.4 running on Intel x86 compatible processors.

    • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
5/3/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
2101Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesni Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5402
2100Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesgen Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5401
2099Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK aesasm Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5400
2098Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shassse3 Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4337
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3578
2097Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shagen Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4336
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3577
2096Qualcomm Technologies, Inc.
5775 Morehouse Dr
San Diego, CA 92121
USA

Yin Ling Liong
yliong@qti.qualcomm.com
858-651-7034
Fax: 858-845-1523

QTI Random Number Generator (version 2.3.1)

Snapdragon 636


Snapdragon 636 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

    • N/A
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4334
2095Qualcomm Technologies, Inc.
5775 Morehouse Dr
San Diego, CA 92121
USA

Yin Ling Liong
yliong@qti.qualcomm.com
858-651-7034
Fax: 858-845-1523

QTI Random Number Generator (version 2.3.1)

Snapdragon 660


Snapdragon 660 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

    • N/A
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4333
2094D'Crypt Pte Ltd
28 Sin Ming Lane
#06-133 Midview City
Singapore, Singapore 573953
Singapore

Sales & Marketing
marketing@d-crypt.com
(65) 6933-1800
Fax: (65) 6684-5142

Quek Gim Chye
fips@d-crypt.com
(65) 6933-1823
Fax: (65) 6684-5142

D'Crypt Cryptographic Library

3.8 (Firmware)


The D''Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D''Crypt Micro O/S, which is a secure operational environment for running high security applications.

    • Intel x86 64 bit
    • ARM Cortex-A
5/3/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5399
2093Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shaavx2 Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4331
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3575
2092Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 UEK shaavx Implementation

R7-2.0.0


Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

    • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4330
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3574
2091Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AES and SHA1 assembler

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
5/3/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5396
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4329
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3573
2090Nationz Technologies Inc.
5F, Building A, IER of Huazhong University of Science and Technology
#9 Yuexing Ave. 3, Nanshan District
Shenzhen, Guangdong 518057
P.R.China

Max Jiang
jiang.zhaolai@nationz.com.cn
+86 185 7675 1645

Nationz Secure IC

v1.1 (Firmware)


The Z32HUB II secure chip is based on the 32bit CPU. Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc.

    • Z32HUB II secure IC, V1.0
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4327
2089Nationz Technologies Inc.
5F, Building A, IER of Huazhong University of Science and Technology
#9 Yuexing Ave. 3, Nanshan District
Shenzhen, Guangdong 518057
P.R.China

Max Jiang
jiang.zhaolai@nationz.com.cn
+86 185 7675 1645

Nationz Z32H330TC TPM 2.0 Cryptographic Engine TCE01

v1.1 (Firmware)


Nationz Z32H330TC TPM 2.0 (Trusted Platform Module), Security processor with embedded firmware compliant with TPM Family 2.0 level 00, revision 1.16 Errata Version 1.5.

    • Z32H330TC secure IC, V1.0
5/3/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4326
2088Nuvoton Technology Corporation
No. 4, Creation Rd. III
Hsinchu Science Park 300
Taiwan, R.O.C.

Yossi Talmi
yossi.talmi@nuvoton.com
+972-9-9702364
Fax: +972-9-9702001

Oren Tanami
oren.tanami@nuvoton.com
+972-9-9702390
Fax: +972-9-9702001

Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

LAG019


Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

    • N/A
5/3/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5390
2087Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen, Certification Program Manager
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos 18.1R1 - OpenSSL

18.1R1 (Firmware)


The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E31xx (Sandy Bridge)
    • Freescale e500 dual core (PB0BJSSE1PNB)
5/3/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3571
2086Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen, Certification Program Manager
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos 18.1R1 - Kernel

18.1R1 (Firmware)


The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E31xx (Sandy Bridge)
    • Freescale e500 dual core (PB0BJSSE1PNB)
4/27/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3569
2085Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
4/27/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5387
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4321
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3568
2084Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - OpenSSL

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon II (CN6335)
    • Cavium Octeon III (CN7130)
    • Intel Xeon C5518
4/27/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3567
2083Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(650) 265-4200
Fax: (408) 738-2065

Mike Jamison
(678) 473-2907
Fax: (678) 473-8470

Cloudpath Cryptographic Library for Java

1.0


Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
4/27/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5382
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4318
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3565
2082VMware AirWatch
1155 Perimeter Center West
Suite 100
Atlanta, GA 30338
USA

Gary Sturdivant
sturdivant@vmware.com
1-650-427-1911
Fax: 1-650-427-5001

OpenSSL

2.0.16


"Airwatch OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms. The algorithms are implemented by OpenSSL which is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/"

    • Qualcomm MSM8998 w/ Android 7.1
4/20/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5377
2081Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4314
2080BiObex, LLC
11501 Sunset Hills Rd
Suite 200
Reston, VA 22190
USA

Arthur Joyce
ajoyce@biobex.com
571-313-0969

SAFE-Key device

1.2.0.0 (Firmware)


The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

    • STM32F415
4/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4313
2079Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5370
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4312
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3558
2078IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2o [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
4/13/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5369
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: SHS #4311
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: HMAC #3557
2077ClevX, LLC
9306 NE 125th Street
Kirkland, WA 98034
USA

Lev Bolotin
Lev.Bolotin@clevx.com
+1.425.820.9929

Marc Singer
Marc.Singer@clevx.com
425.820.9929

ClevX Datalock Cryptographic Library

ClevX-Datalock-v2.0 (Firmware)


ClevX Datalock Cryptographic Firmware Library

    • STM32L0x
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5366
2076VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • Counter:
    • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5365, TDES #2709
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3553
2075wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

3.14.2


The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

    • Intel x86 w/ NetBSD v6.0.1
4/9/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4306
2074Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd.
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dylib

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ iOS 10.3.3
4/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5363
2073Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5328
2072Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5329
2071Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AES and SHA1 assembler

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5353
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4304
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3550
2070Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5352
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4303
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3549
2069Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5349
2068Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4300
2067Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - Kernel

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7130)
    • Cavium Octeon II (CN6335)
    • Intel Xeon C5518
    • Cavium Octeon III (CN7020)
3/30/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3545
2066SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
3/30/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4297
2065Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

Aruba Common Cryptographic Module (CCM)

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 10 64-bit User Mode
    • Intel Core i5 w/ Windows 10 32-bit User Mode
    • ARMv7 w/ Android 7.1
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5345
2064Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL VPAES and SHA1 SSSE3

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5344
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4295
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3541
2063BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5343
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4294
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3540
2062BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5342
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4293
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3539
2061Certes Networks, Inc.
300 Corporate Center Drive
Suite 140
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point Cryptographic Library

1.0.2l (Firmware)


The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

    • Intel Xeon Processor E3 v5 Family
    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
3/30/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5338
2060Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - Authentec

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
    • Broadcom XLP832
    • Cavium Octeon III (CN7130)
    • Cavium Octeon II (CN6335)
3/30/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3534
2059Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • Intel Atom
3/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5333
2058Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/23/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3528
2057BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5327
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4279
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3525
2056Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5326
2055wolfSSL Inc
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Kaleb Himes
kaleb@wolfssl.com

wolfCrypt

3.12.6


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • NS9210 w/ NET+OS v7.6
3/23/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4277
2054Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS 17.3R2 - Kernel

17.3R2 (Firmware)


The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

    • Intel Xeon D
3/23/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3522
2053Digi International, Inc.
11001 Bren Road East
Minnetonka, MN 55343
USA

Donald Schleede
Donald.Scleede@digi.com
952-912-3444

Digi ConnectCore Security Module

1.0


The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

    • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
    • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
3/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5323
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4275
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3521
2052Digital Guardian, Inc.
860 Winter Street
Suite 3
Waltham, MA 02541
USA

Craig Hansen
201-572-3784

FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

1.1


Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

    • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
3/16/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4274
2051Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Kernel - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3518
2050Fortinet Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

Alan Kaye
akaye@fortinet.com
613-225-9381 x7416
Fax: 613-225-9951

Fortinet FortiMail RNG Cryptographic Library 6.0

6.0 (Firmware)


This focuses on the firmware implementation of the Fortinet FortiMail RNG Cryptographic Library v6.0 running on Intel x86 compatible processors.

    • Intel Xeon
3/16/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5321
2049Mojo Networks, Inc.
339 N Bernardo Avenue, Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
hemant.chaskar@mojonetworks.com
(650) 961-1111
Fax: (650) 961-1169

Crypto Core

2.0.16-3-00 (Firmware)


Cryptographic library offering various cryptographic mechanisms in server.

    • Intel Xeon
3/16/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5318
2048Cisco Systems, Inc
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

7.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

    • ARMv8 w/ Android 7.1
    • Intel Core i5 w/ Windows 10 (with AES-NI)
    • Intel Core i7 w/ macOS 10.12 (with AES-NI)
    • Intel Core i5 w/ Windows 10
    • Intel Pentium w/ Linux 3.4
    • ARMv8 w/ iOS 11.2
    • Intel Core i7 w/ macOS 10.12 (without AES-NI)
    • Cavium Octeon II 68XX w/ Wind River Linux 4
    • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
    • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
3/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5310
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4267
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3513
2047Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3512
2046Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3511
2045Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3510
2044Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3509
2043Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3508
2042Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3507
2041Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3503
2040Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3502
2039Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3501
2038Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Patrick Scully
613-670-3207

Ciena Waveserver

1.5.1 (Firmware)


The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

    • Xilinx XC7Z030
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5302
2037Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

10.0.15063.728


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5300
2036Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); SymCrypt Cryptographic Implementations

10.0.14393.1770


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
    • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5295
2035Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Enterprise LTSB (version 1507); SymCrypt Cryptographic Implementations

10.0.10240.17643


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5291
2034Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5288
2033Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); SymCrypt Cryptographic Implementations

10.0.10586.1176


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
    • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
    • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/Windows 10 Mobile November Update (ARMv7)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5287
2032Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
3/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5286
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4245
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3493
2031Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ CentOS v7.3
3/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5285
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4244
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3492
2030DocuSign, Inc.
221 Main St.
Suite 1000
San Francisco, CA 94105
USA

Ezer Farhi
Ezer.Farhi@docusign.com
+972-39279529
Fax: +972-39230864

Moshe Harel
Moshe.Harel@docusign.com
+972-39279578
Fax: +972-39230864

PrivateServer

5.0.3 (Firmware)


PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

    • Intel® E3-1268LV3 Quad-Core
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3490
2029Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Key Hardware DRBG (Apple T2 - iBridge2,1)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple Apple T2 (iBridge2,1) SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5279
2028Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple S3)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S3 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5278
2027Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG for tvOS 4.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5277
2026Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple S1P)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S1P SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5276
2025Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A9)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5275
2024Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5274
2023Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A10)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5273
2022Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A9X)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5272
2021Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A8X)

1.2


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5271
2020Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A8)

1.2


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5270
2019Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Michael Arrowsmith
415-848-8400

Splunk Cryptographic Module

2.0.16


The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ Ubuntu 16.04
    • Intel Xeon E5 with PAA w/ Ubuntu 16.04
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5268
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4238
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3487
2018Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL with FOM 6.0

6.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon w/ ADE-OS v3.0
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5267
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4237
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3486
2017Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS OpenSSL Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ8064
    • Qualcomm IPQ4029
    • NXP QorIQ T1024
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5266
2016IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2n [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
2/23/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5263
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: SHS #4234
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: HMAC #3483
2015Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5262
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4233
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3482
2014Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A11)

2.0


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A11 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5261
2013Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG (Apple A7)

1.2


Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A7 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

    • N/A
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5260
2012Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5259
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4232
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3481
2011Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • ARMv8
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5258
2010Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.2


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos7883 w/ Android 8.0
    • Qualcomm MSM8998 w/ Android 8.0
    • Qualcomm MSM8996 w/ Android 8.0
    • Qualcomm SDM845 w/ Android 8.0
    • Samsung Electronics Exynos8890 w/ Android 8.0
    • Samsung Electronics Exynos9810 w/ Android 8.0
    • Samsung Electronics Exynos8895 w/ Android 8.0
    • Samsung Electronics Exynos7570 w/ Android 8.0
    • Samsung Electronics Exynos7884 w/ Android 8.0
2/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5255
2009Mocana Corporation
150 Mathilda Place
Suite 208
Sunnyvale, CA 94086
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.5.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Intel Atom E3800 w/ Wind River Linux 6.0
2/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5252
2008
2/16/2018
    2007Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Marks
    seceval_us@oracle.com
    650-506-0391

    Oracle Acme Packet Cryptographic Library

    ECz8.0.0 (Firmware)


    The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

      • Intel Core i3
      • Intel Core i7
    2/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5247
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4225
    2006wolfSSL Inc
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Kaleb Himes
    kaleb@wolfssl.com

    wolfCrypt

    3.12.4


    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel(R) Core(TM) i5 w/ Windows 10 Pro
      • Intel(R) Xeon(R) E3-1270 w/ Debian 8.7.0
    2/16/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4222
    2005Gemalto
    Avenue du Jujubier
    Z.I Athelia IV
    La Ciotat, 13705
    France

    Frederic Garnier
    Frederic.Garnier@gemalto.com
    +33 442364368
    Fax: +33 442366953

    Didier Bonnet
    Didier.Bonnet@gemalto.com
    +33 442366803
    Fax: +33 442365545

    Gemalto Cryptographic library for IDCore 3130 on SLE78

    Infineon SLE78CLFX400VPHM 1.9 (Firmware)


    IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

      • Infineon SLE78 chip (M7892)
    2/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5243
    2004Evertz Microsystems
    5292 John Lucas Dr.
    Burlington, Ontario L7L 5Z9
    Canada

    Naveed Afzal
    nafzal@evertz.com
    905-335-3700

    EXE OpenSSL Cryptographic Module

    2v0_b1 (Firmware)


    Card for 6RU Shelf loaded with Evertz IPX

      • MPC8377E
    2/16/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5242
    2003Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 libgcrypt

    R7-2.0.0


    The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5237
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4217
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3469
    2002Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0


    The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5236
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4216
    2001Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0 (Firmware)


    The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon D-1548 (Intel Broadwell-DE)
      • Intel Atom C2358
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5235
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4215
    2000Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8221


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5234
    1999Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8237


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5233
    1998Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8205


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5232
    1997Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 libgcrypt

    R7-2.0.0


    The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

      • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5231
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4211
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3463
    1996Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder® FIPS Core

    6.3.0


    Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

      • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
      • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
      • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
      • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      • Intel Atom C3558 without AES-NI w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5230
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4210
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3462
    1995IBM Corporation
    222 South Riverside Plaza
    Ste 1700
    Chicago, IL 60606
    USA

    Mark Seaborn
    mseaborn@us.ibm.com
    +1 312 423 6640x2354

    IBM Cloud Object Storage System's™ FIPS Cryptographic Module

    1.1


    The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
      • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5229
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4209
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3461
    1994Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Linux 2.6 64-bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5228
    1993Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5227
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4207
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3459
    1992Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5226
    1991Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1P w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5225
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3458
    1990Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5224
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3457
    1989Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1P w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5221
    1988Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5219
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3456
    1987Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1P w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5217
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3455
    1986Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5216
    1985Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1P w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5215
    1984Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5212
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4202
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3454
    1983Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5211
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4201
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3453
    1982Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5210
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4200
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3452
    1981Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5209
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4199
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3451
    1980Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5208
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4198
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3450
    1979Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5207
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4197
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3449
    1978Gallagher Group
    181 Kahikatea Drive
    Hamilton 3206
    New Zealand

    Andrew Scothern
    andrew.scothern@gallagher.com
    +64-7-838-9800

    Simon Lawrence
    simon.lawrence@gallagher.com
    +64-7-838-9800

    Gallagher OpenSSL Cryptographic Module

    2.0.12


    Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

      • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5206
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4196
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3448
    1977Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5205
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4195
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3447
    1976Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5204
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4194
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3446
    1975Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5203
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4193
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3445
    1974Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3444
    1973Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5201
    1972Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5199
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3443
    1971Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5198
    1970Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5195
    1969Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5194
    1968Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5193
    1967Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5192
    1966Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5191
    1965Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5190
    1964Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5189
    1963Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5188
    1962Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5187
    1961Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3442
    1960Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5185
    1959Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3441
    1958Samsung Electronics Co., Ltd.
    R5, Maetan 3-dong Yeongton-gu
    Suwon-si, Gyeonggi 443-742
    Korea

    JungHa Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung Kernel Cryptographic Module

    1.9


    Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

      • Exynos 9810 w/ Android 8 Kernel 4.9
      • SDM845 w/ Android 8 (Kernel 4.9)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3439
    1957Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5182
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3438
    1956Centrify Corporation
    3300 Tannery Way
    Santa Clara, California 95054
    USA

    Kitty Shih
    kitty.shih@centrify.com
    669-444-5238

    Centrify Cryptographic Library

    2.1


    Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

      • Intel Xeon X5650 x86_64 w/ RHEL 7.2
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5181
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4185
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3437
    1955Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung SCrypto Library

    v2.2


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5180
    1954iStorage Limited
    iStorage House
    13 Alperton Lane
    Perivale
    Middlesex UB6 8DH
    England

    John Michael
    john@istorage-uk.com
    +44 (0)20 8991 6260
    Fax: +44 (0)20 8991 6277

    iStorage diskAshur2 Cryptographic Library

    00.04.17.01 (Firmware)


    The iStorage diskAshur2 cryptographic library is a firmware library that provides cryptographic functions for iStorage diskAshur2 range of PIN authenticated, hardware encrypted portable data storage devices. The cryptographic functions include AES-ECB-256, AES-CTR-256, SHA256, HMAC256, KWAE, KWAD and DRBG.

      • IST28398Q
    1/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5179
    1953Datrium
    385 Moffett Park Dr #205
    Sunnyvale, CA 94089
    USA

    R. Hugo Patterson
    info@datrium.com
    +1 (669) 721-9444

    Datrium FIPS Object Module

    2.0.12


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Intel Xeon E5-2618L v4 w/ Linux 3.10
      • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
      • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5178
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4182
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3434
    1952Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3433
    1951Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5175
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3432
    1950Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5173
    1949Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5172
    1948Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    RFX DRBG

    RFX DRBG V1.0 (Firmware)


    PM 1643 Series is high-performance Self-Encrypting SSD supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, RSA-PSS 2048 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    1/26/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4178
    1947SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Sales
    sales@safelogic.com

    CryptoComply® Server

    2.1


    CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

      • Intel i7 w/ Windows Server 2012 R2
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5170
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4177
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3431
    1946Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.14


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
      • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5168
    1945Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.13


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5167
    1944Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Java API

    1.0.0


    Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5166
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4173
    1943Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5165
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3426
    1942Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5164
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3425
    1941Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5163
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3424
    1940Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5162
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3423
    1939Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5161
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3422
    1938Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5160
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3421
    1937Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5159
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3420
    1936Mojo Networks, Inc.
    339 N Bernardo Avenue, Suite 200
    Mountain View, CA 94043
    USA

    Hemant Chaskar
    hemant.chaskar@mojonetworks.com
    (650) 961-1111
    Fax: (650) 961-1169

    Crypto Core

    2.0.16-1-01 (Firmware)


    Cryptographic library offering various cryptographic mechanisms in sensor and access point.

      • ARMv7
    1/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5158
    1935Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11 Fusion
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5157
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3418
    1934Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5156
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3417
    1933Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5155
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3416
    1932Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5154
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3415
    1931Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5153
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3414
    1930Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5152
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3413
    1929Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5151
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3412
    1928Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5150
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3411
    1927Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5149
    1926Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3410
    1925Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10X w/ tvOS 11 Fusion
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5145
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3409
    1924Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5143
    1923Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5131
    1922Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3408
    1921Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S1P w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3407
    1920Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5128
    1919Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

      • Apple S1P w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5127
    1918Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3406
    1917Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S1P w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3405
    1916Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

      • Apple S1P w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5126
    1915Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5125
    1914GDC Technology (USA) LLC
    1016 West Magnolia Boulevard
    Burbank, California 91506
    USA

    Pranay Kumar
    pranay@gdc-tech.com
    (852) 2507 9565
    Fax: (852) 2579 1131

    ChernYue Kwok
    Chernyue.kwok@gdc-tech.com
    (852) 2507 9552
    Fax: (852) 2579 1131

    Standalone IMB Cryptographic Module

    2.0.11 (Firmware)


    A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

      • Xilinx Zynq Ultrascale+
    1/19/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5122
    1913Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5118
    1912Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5115
    1911Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5114
    1910Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5110
    1909Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5106
    1908Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5103
    1907Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5102
    1906Silver Spring Networks
    230 W Tasman Drive
    San Jose, CA 95134
    USA

    Andrew Pendray
    support@ssni.com
    +1 669 770 4000
    Fax: +1 886 776 0015

    Silver Spring Networks Endpoint Security Module

    130-0117-02


    Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard crytographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

      • N/A
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-512
      • Prerequisite: HMAC #3402
    1905Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Timothy McDonough
    timothy.mcdonough@hpe.com

    Hewlett Packard Enterpprise SSL Crypto Module

    2.1


    Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

      • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5099
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4147
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3401
    1904Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
      • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5098
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4146
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3400
    1903Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
      • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5097
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4145
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3399
    1902Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Access Point SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

      • Qualcomm IPQ8068
      • Qualcomm IPQ8064
      • Qualcomm IPQ8065
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5096
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4144
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3398
    1901Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (678) 473-2907
    Fax: (678) 473-8470

    Mike Jamison
    (678) 473-2907
    Fax: (678) 473-8470

    Cloudpath Cryptographic Library

    1.0


    Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5095
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4143
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3397
    1900Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3396
    1899Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3395
    1898Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5092
    1897Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5091
    1896Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Bishakha Banerjee
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - Kernel

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3393
    1895Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - OpenSSL

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3392
    1894Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5088
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3391
    1893Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5087
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3390
    1892Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5086
    1891Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5085
    1890Toshiba Memory Corporation
    1-1, Shibaura 1-chome
    Minato-ku, Tokyo 105-8001
    Japan

    Akihiro Kimura
    akihero.kimura@toshiba.co.jp
    +81-45-890-2856
    Fax: +81-45-890-2593

    Crypto Library Hash_DRBG

    1.0.0 (Firmware)


    a library of unique software cipher solutions which are standard encryption algorithm-based to provide Toshiba Memory Corporation enterprise SSD products and the systems using them a robust and secure data storage environment

      • Cortex-M3
    1/12/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4128
    1889Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i5 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5072
    1888Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i7 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5071
    1887SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sanagala
    usanagala@sonicwall.com
    408-962-6248
    Fax: 408-745-9300

    SonicWall Crypto Library

    SonicOS 6.2.5 (Firmware)


    SonicWall Crypto Library

      • Cavium Octeon
    1/5/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4130
    1886Infineon Technologies AG
    Alter Postweg 101
    Augsburg, BY 86159
    Germany

    Roland Ebrecht
    Roland.Ebrecht@infineon.com
    +49-821-25851-68
    Fax: +49-821-25851-40

    Thomas Hoffmann
    Thomas.Hoffmann@infineon.com
    +49-821-25851-24
    Fax: +49-821-25851-40

    Trusted Platform Module 2.0 SLB 9670

    SLB 9670 7.83 (Firmware)


    Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

      • Infineon SLB 9670 security controller IC
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5069
    1885Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13
    1/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3382
    1884Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    SPENCER HE
    heshunbin@huawei.com
    +86-755-28979041

    EulerOS 2.0

    EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

      • Intel Xeon w/ EulerOS 2.0
    1/5/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5066
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4126
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3381
    1883Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel Xeon w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5065
    1882Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i5 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5063
    1881Silver Peak Systems, Inc.
    2860 De La Cruz Blvd.
    Santa Clara, CA 95050
    USA

    Damon Ennis
    (408) 935-1836

    Anusha Vaidyanathan
    (408) 935 1800
    Fax: (408) 588-1608

    Silver Peak Cryptographic library

    1.0 (Firmware)


    Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

      • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
      • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
    1/5/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5060
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4125
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3380
    1880Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
    12/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5059
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4124
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3379
    1879Private Machines, Inc
    164 20th Street
    4A-4B
    Brooklyn, NY 11232
    USA

    Sumeet Bajaj
    sumeet@privatemachines.com

    Radu Sion
    sion@privatemachines.com

    Private Machines Enforcer DRBG Library

    L4-1 1.0.1 (Firmware)


    The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

      • MAX32550 Cortex M3
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3385
    1878Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5057
    1877Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5056
    1876Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5055
    1875Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5054
    1874Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3377
    1873Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3376
    1872Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3375
    1871Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5051
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3374
    1870Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Core M w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5050
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3373
    1869Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5049
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3372
    1868Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5048
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3371
    1867Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    JUNOS Version 17.3R2 - OpenSSL

    17.3R2 (Firmware)


    The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

      • Intel Xeon D
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3367
    1866Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
    12/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5045
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4110
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3365
    1865SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5.0 for TZ, NSA and SuperMassive

    FW Version 6.5.0 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium OCTEON III (CN7XXX)
      • Cavium OCTEON II (CN6XXX)
    12/22/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4109
    1864DocuSign, Inc.
    221 Main St.
    Suite 1000
    San Francisco, CA 94105
    USA

    Ezer Farhi
    Ezer.Farhi@docusign.com
    972-3-9279529

    DocuSign-SA-MAIN

    8.5 (Firmware)


    DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

      • Intel® Xeon Quad-Core
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3363
    1863Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3362
    1862Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5040
    1861Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3361
    1860Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5039
    1859Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    12/22/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5038, AES #5042
    1858Extreme Networks
    6480 Via Del Ora
    San Jose, CA 95119
    USA

    Craig J Ficik
    cficik@extremenetworks.com
    603-9525922
    Fax: 404-806-5377

    Extreme Networks Summit Series

    22.3 (Firmware)


    Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

      • Cavium Octeon II
    12/15/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5037
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3359
    1857Extreme Networks
    6480 Via Del Ora
    San Jose, CA 95119
    USA

    Craig J Ficik
    cficik@extremenetworks.com
    603-952-5922
    Fax: 404-806-5377

    Extreme Networks Summit Series

    22.3 (Firmware)


    Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

      • Intel Atom C series
    12/15/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5036
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3358
    1856Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3357
    1855Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3356
    1854Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10X Fusion w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3355
    1853Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3354
    1852Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3353
    1851Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3352
    1850Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3351
    1849Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3350
    1848Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (Kernel)

    2.0


    The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

      • Intel® Core i5-3337U w/ Linux Debian 7.11 (64 bit)
      • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5035
    1847Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (User Space)

    2.0


    n/a

      • n/a w/ Windows 10 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5034
    1846Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (User Space)

    2.0


    The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

      • Intel® Core i5 w/ MacOS X 10.12
      • Apple A10 Fusion w/ iOS 10.3.3
      • Samsung Exynos 7880 w/ Android 7.0
      • Intel® Core i5-3337U w/PAA w/ Linux Debian 7.11 (64-bit)
      • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
      • Intel® Core i5-3337U w/ Linux Debian 7.11 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5033
    1845Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    EPiC2 DRBG

    EPiC2 DRBG V1.0 (Firmware)


    PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    12/15/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4072
    1844DELL, Inc.
    One Dell Way
    Round Rock, Texas 78682
    USA

    Alaric Silveira
    Alaric.Silveira@dell.com

    Gang Liu
    gang_liu@dell.com
    +1 512 728 5545

    Dell Crypto Library for Dell iDRAC and Dell CMC

    2.4


    The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

      • ARMv7 NPCMX50 w/ Linux 4.1.12
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5032
    1843McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Andy Nissen
    andy.nissen@intel.com
    651-770-6151

    McAfee Advanced Threat Defense

    4.0


    A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

      • Intel Xeon w/ Linux 4.4.27
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5031
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4090
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3345
    1842Certes Networks, Inc.
    300 Corporate Center Drive
    Suite 140
    Pittsburgh, PA 15108
    USA

    Sean Everson
    sean.everson@certesnetworks.com
    1.412.357.1130
    Fax: 1.412.262.2574

    Gary Brunner
    gary.brunner@certesnetworks.com
    1.412.200.2177
    Fax: 1.412.262.2574

    CryptoFlow Net Creator Java Crypto Module

    1.0


    The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

      • Intel Xeon E3-1270v5 w/ CentOS 6.7
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5028
    1841RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    FIPS Program
    fips-program@rsa.com

    RSA BSAFE® Crypto-J JSAFE and JCE Software Module

    6.2.4


    RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

      • Intel Core i5 w/ Windows 10 (64-bit)
      • Intel Xeon w/ CentOS 7.3
      • Qualcomm Snapdragon w/ Android 7.1.2
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5026
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • Prerequisite: SHS #4085
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • Prerequisite: HMAC #3340
    1840Konica Minolta, Inc.
    2970, Ishikawa-machi
    Hachioji-shi, Tokyo 192-8505
    Japan

    R&D Administration Division, R&D Headquarters Business Techn

    Konica Minolta PP Crypto Library

    1.0 Rev.1 (Firmware)


    Konica Minolta PP Crypto Library is used in bizhub PRO 1100 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generation/verification, AES, hash function including SHA and HMAC_DRBG.

      • Intel(R) Pentium G3420
    12/8/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3339
    1839Ruckus Wireless, Inc.
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Suneetha Sarala
    Suneetha.Sarala@arris.com
    650-265-4200

    Julie Lu
    Julie.Lu@arris.com
    650-265-4200

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • Freescale P2041
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5024
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4083
    1838Ruckus Wireless, Inc.
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Suneetha Sarala
    Suneetha.Sarala@arris.com
    650-265-4200

    Julie Lu
    Julie.Lu@arris.com
    650-265-4200

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A57
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5023
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4082
    1837Ruckus Wireless, Inc.
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Suneetha Sarala
    Suneetha.Sarala@arris.com
    650-265-4200

    Julie Lu
    Julie.Lu@arris.com
    650-265-4200

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A9
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5022
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4081
    1836SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Core i5 with AES-NI
      • Intel Xeon with AES-NI
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5020
    1835Neopost Technologies, S.A.
    42-46 Avenue Aristide Briand
    Bagneux, Hauts-de-Seine 92220
    France

    Adriana Rosca
    a.rosca@neopost.com
    +33 1 45 36 61 04
    Fax: +33 1 45 36 30 10

    Neopost PSD

    A0038116B (Firmware)


    Neopost Postal Secure Device (PSD) for low to high range of franking machines

      • NXP LPC3220 Microprocessor
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #2874
    1834HGST, a Western Digital company
    3403 Yerba Buena Road
    San Jose, CA 95119
    USA

    Michael Williamson
    michael.williamson@wdc.com
    408-717-8458

    Vishal Tanna
    Vishal.Tanna@wdc.com
    408-801-2499

    TCG Crypto Library

    SVN Revision 2038 (Firmware)


    Cryptographic library support for Western Digital's HGST branded Self-Encrypting Drives (SEDs).

      • Marvell ARM Cortex R5
    11/30/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3333
    1833Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3332
    1832Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

      • Apple A10X w/ tvOS 11 Fusion
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3331
    1831Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5015
    1830Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5014
    1829Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10X Fusion w/ iOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5009
    1828Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto Virtual

    F6.2


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5008
    1827Brocade Communications Systems LLC
    120 Holger Way
    San Jose, CA 95110
    USA

    Hamid Sabouti
    hamid.sobouti@broadcom.com
    408-333-4150
    Fax: 408-333-3844

    Brocade Fabric OS FIPS Cryptographic Module

    8.2.0


    Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

      • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
      • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5006
    1826SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 with AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4070
    1825SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 without AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4069
    1824SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS z13

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4068
    1823SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Xeon with AES-NI
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5001
    1822SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Core i5 with AES-NI
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5000
    1821Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell MV78460-B0 w/ Lexmark Linux v4
    11/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #4998
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4064
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3321
    1820Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell 88PA6270C0 w/ Lexmark Linux v4
    11/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #4997
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4063
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3320
    1819Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3319
    1818Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3318
    1817Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3317
    1816Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3316
    1815Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3315
    1814Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3314
    1813Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3313
    1812Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3312
    1811Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3311
    1810Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3310
    1809Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3309
    1808Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3308
    1807Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4988
    1806Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4987
    1805Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4986
    1804Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4985
    1803Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A11 Bionic w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4984
    1802Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10 Fusion w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4983
    1801Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9X w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4982
    1800Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4981
    1799Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4980
    1798Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8X w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4979
    1797Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A7 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4978
    1796Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4976
    1795Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4975
    1794Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4974
    1793Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4973
    1792Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4972
    1791Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4971
    1790Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4970
    1789Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4969
    1788Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    QTI Pseudo Random Number Generator (Version 2.3.1)

    Snapdragon 845


    Snapdragon 845 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

      • N/A
    11/22/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4047
    1787Cisco Systems, Inc.
    170 W Tasman Dr
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6520

    CiscoSSL FIPS Object Module

    6.0 (Firmware)


    The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

      • Apple A10 on iOS 10.x
    11/17/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4956
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4046
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3304
    1786Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3303
    1785Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3302
    1784Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3301
    1783Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3300
    1782Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3299
    1781Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3298
    1780Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3297
    1779Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3296
    1778Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3295
    1777Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3294
    1776Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3293
    1775Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3292
    1774Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4947
    1773Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4946
    1772Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4945
    1771Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4944
    1770Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3291
    1769Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - Authentec

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3289
    1768Renesas Electronics Corporation
    5-20-1 Jousuihon-cho
    Kodaira-shi, Tokyo 187-8588
    Japan

    Hideyuki Tanaka
    hideyuki.tanaka.jc@renesas.com
    +81-42-312-6926
    Fax: +81-42-328-4374

    TSIP

    RX Family RX65N Version 1.03 (Firmware)


    The TSIP is hardware which consists of cryptographic accelerator, random number generator and access management circuit based on the chip-unique-ID. The TSIP is embedded in the general purpose MCUs, RX65N and RX651. Therefore, RX65N and RX651 can provide the TSIP secure cryptographic functions including strong key management.

      • n/a
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Prerequisite: AES #4940
    1767Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4939
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3288
    1766Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple 10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4938
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3287
    1765Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4937
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3286
    1764Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4936
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3285
    1763Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4935
    1762Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4934
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3284
    1761Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4933
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3283
    1760Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4932
    1759Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4931
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3282
    1758Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4930
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3281
    1757Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4929
    1756Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4928
    1755Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4927
    1754Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4926
    1753Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4925
    1752Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4924
    1751Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3280
    1750Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3279
    1749Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3278
    1748Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3277
    1747Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3276
    1746Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4923
    1745Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3275
    1744Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3274
    1743Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4922
    1742Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4921
    1741Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4920
    1740Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4919
    1739Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4918
    1738Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4917
    1737Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4916
    1736Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3273
    1735Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto

    F6.2 (Firmware)


    The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

      • Intel Atom C2xxx Family, Intel Xeon 34xx Family
      • Intel Xeon E Family
      • Intel Xeon D Family
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4905
    1734Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub Virtual TPM Implementations

    10.0.15063.674


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4904
    1733Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

    10.0.16299


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4903
    1732Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub SymCrypt Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4902
    1731Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

    10.0.15254


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4901
    1730Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

    10.0.16299


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4897
    1729Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3266
    1728Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3265
    1727Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3264
    1726Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3263
    1725Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3262
    1724Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3261
    1723Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3260
    1722Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3259
    1721Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4877
    1720Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8X w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4876
    1719Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4875
    1718Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4874
    1717Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4873
    1716Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9X w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4872
    1715Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4871
    1714Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A7 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4870
    1713Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA

    Farzam Tajbakhsh
    ftajbakhsh@tinri.com
    (650) 810-8266

    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri OS 4.5
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4861
    1712Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA

    Farzam Tajbakhsh
    ftajbakhsh@tintri.com
    (650) 810-8266

    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri OS 4.5
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4860
    1711Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA
    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4860
      1710Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4859
      1709Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2680 @ 2399MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4858
      1708Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2620 @ 2100MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4857
      1707Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms by the module have been made.

        • Intel Xeon E5-2609 @ 1699MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4856
      1706Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      KMeagher@ciena.com

      Ciena 6500 Packet Optical Family

      12.3


      Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

        • PowerQUICC II w/ VxWorks 6.1
        • PowerQUICC II w/ VxWorks 6.3
      11/3/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4855
      1705Hewlett Packard Enterprise
      8000 Foothills Blvd.
      Roseville, CA 95747
      USA

      Susan Scotten
      susan.scotten@hpe.com
      1-916-540-1109

      Aruba Campus Switch Series Crypto Library

      16.04 (Firmware)


      Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

        • Freescale P2020 Dual Core
        • Dual Core ARM Coretex
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4853
      1704Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      SafeXcel 3120 Chip

      SF114-011206-001A, v2.9.5


      The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

        • N/A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4849
      1703Thales e-Security Inc.
      900 South Pine Island Road
      Suite 710
      Plantation, FL 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.con
      954-888-6215

      Vormetric Data Security Manager Virtual Appliance Module

      6.0.0


      The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

        • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4846
      1702Thales e-Security Inc.
      900 South Pine Island Road
      Suite 710
      Plantation, FL 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.con
      954-888-6215

      Vormetric Data Security Manager Module

      6.0.0 (Firmware)


      The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

        • Intel Xeon
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4845
      1701Pure Storage, Inc.
      650 Castro Street
      Suite 400
      Mountain View, CA 94041
      USA

      John Fuchigami
      jfuchigami@purestorage.com
      800-379-7873

      Flash Array Crypto Library

      1.2.0


      Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4844
      1700F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP vCMP on B4450 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4841
      1699SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE libgcrypt using generic C implementation

      3.0


      This test covers generic C implementation of multiple algorithms.

        • z13 w/ SUSE Linux Enterprise Server 12 SP2
      11/3/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4840
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #3982
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3241
      1698F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP vCMP on B2250 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4839
      1697F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP 10350F TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4838
      1696F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B4450N TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4837
      1695F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038
      Fax: ~

      BigIP B2250 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4836
      1694F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP vCMP on B4450 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4835
      1693F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B4000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4834
      1692F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i5820 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4833
      1691F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B7000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E3-1275
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4832
      1690F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i7820 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1650
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4834
      1689F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i4000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4830
      1688F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B4450N OpenSSL Software Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4829
      1687F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B2250 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4828
      1686F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP 10350F OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4827
      1685F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP vCMP on B2250 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4826
      1684F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B4000 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4825
      1683F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i4000 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4824
      1682F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i7820 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1650
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4823
      1681F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i5820 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4822
      1680F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B7000 OpenSSL Software Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

        • Intel(R) Xeon(R) CPU E3-1275
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4821
      1679McAfee, Inc.
      2821 Mission College Blvd.
      Santa Clara, CA 95054
      USA

      Mark Hanson
      Mark_Hanson@McAfee.com

      McAfee NSP NS Crypto Lib

      n.a 2.0.5_9.1.17.2 (Firmware)


      Cryptographic services for the McAfee NSP Intrusion Prevention appliance

        • Intel Atom C Family
        • Intel Xeon E5 Family
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4820
      1678
      10/27/2017
        1677McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Mark Hanson
        Mark_Hanson@McAfee.com

        McAfee NSP NS Crypto Lib

        n.a 2.0.5_9.1.17.2 (Firmware)


        Cryptographic services for the McAfee NSP Intrusion Prevention appliance

          • Intel Atom C Family
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4817
        1676Synopsys, Inc.
        690 East Middlefield Road
        Mountain View, CA 94043
        USA

        Dana Neustadter
        danan@synopsys.com
        +1(613)595-9836

        DWC Cryptography Software Library

        4.2.0


        The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

          • ARC® EM7D Processor with CryptoPack w/ n/a
        10/20/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4816
        1675IBM
        2455 South Rd
        Poughkeepsie, NY 12601
        USA

        Thomas Morris Jr
        tmorrisj@us.ibm.com
        1-845-435-5538

        William Santiago
        wsf1@us.ibm.com
        1-845-435-9265

        Miniboot 1.30 with 00CW683

        Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


        Miniboot implemented algorithms with hardware acceleration

          • IBM PowerPC 405
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4815
        1674IBM
        2455 South Rd
        Poughkeepsie, NY 12601
        USA

        Thomas Morris Jr
        tmorrisj@us.ibm.com
        1-845-435-5538

        William Santiago
        wsf1@us.ibm.com
        1-845-435-9265

        Miniboot 1.30 with 00KP899

        Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


        Miniboot implemented algorithms with hardware acceleration

          • IBM PowerPC 405
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4814
        1673Tandberg Data
        10155 Westmoor Dr., Suite 155
        Westminster, CO 80021
        USA

        Neil Donohoe
        ndonohoe@overlandstorage.com
        720-598-7265

        Dan Walkes
        dwalkes@overlandstorage.com
        720-598-7264

        RDX RNG

        1.0.1 (Firmware)


        DRBG implementation

          • Altera Nios Classic
        10/20/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3955
        1672IBM Corporation
        9032 S Rita Road
        Tucson, AZ 85744
        USA

        Kevin D. Butt
        kdbutt@us.ibm.com
        520-799-5280

        IBM LTO 7 Cryptographic Firmware Library

        1.0 (Firmware)


        Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO 7 tape drive.

          • IBM PowerPC 405
        10/13/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-512
          • Prerequisite: SHS #3954
        1671Infoblox
        3111 Coronado Drive
        Santa Clara, CA 95054
        USA

        Dave Funk
        dfunk@infoblox.com
        408-986-5591

        NIOS Cryptographic Library

        2.0 (Firmware)


        Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

          • Intel Xeon w/ VMware ESXi 5
          • Intel Xeon
          • Intel Xeon w/ VMware ESXi 6
          • Intel Core i3
        10/13/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4805
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3953
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3215
        1670McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Mark Hanson
        Mark_Hanson@McAfee.com
        972.963.7326

        McAfee NSP NS Crypto Lib

        2.0.5_9.1.17.1 (Firmware)


        Cryptographic services for the McAfee NSP Intrusion Prevention appliances

          • Intel Xeon Gold Family
        10/13/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4801
        1669Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4800
        1668Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4799
        1667Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4798
        1666Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS Version 17.3R1-OpenSSL

        17.3R1 (Firmware)


        The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

          • Intel Xeon D-1531
        10/6/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3202
        1665Zebra Technologies Corporation
        3 Overlook Point
        Lincolnshire, IL 60069
        USA

        Erv Comer
        Erv.Comer@zebra.com
        480-628-7901

        Rob Franzo
        Rob.Franzo@zebra.com
        631-291-2341

        DRBG of QTI Cryptographic Module on Crypto 5 Core

        5.f4-64


        This cryptographic module implements block ciphers including AES, Triple-DES, hash functions SHA-1 and SHA-256, Message Authentication Code functions HMAC and CMAC and DRBG 800-90A.

          • Snapdragon 650 w/ Android 6.0.1
        9/29/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4792
        1664Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shaavx)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/29/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #3931
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3194
        1663Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shassse3)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/29/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #3930
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3193
        1662SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Sales
        na

        CryptoComply Server Engine

        2.1


        CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

          • Intel i7 w/ CentOS 7
        9/29/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4790
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3929
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3192
        1661MediaTek Inc.
        No.1, Dusing Rd. 1, Hsinchu Science Park
        Hsinchu, Taiwan 30078
        Taiwan

        William Cheng
        William.cheng@mediatek.com
        +1-858-731-9200
        Fax: +1-858-731-9201

        MingHsien Hsieh
        minghsien.hsieh@mediatek.com
        +886-3-567-0766
        Fax: +886-3-578-7610

        MTK CryptoCore V1.0 Secure Core

        MTK CryptoCoreV1.0 S Core


        The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

          • N/A
        9/26/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4789
        1660Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shagen)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3925
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3189
        1659Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesni)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4787
        1658Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesgen)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4786
        1657Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesasm)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4784
        1656Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shaavx2)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3924
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3188
        1655Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Bhadresh Udani
        bhadresh.udani@hpe.com
        +91 9886399320

        Premnath M
        premnath.mangal@hpe.com
        +91 9845369405

        HPE BladeSystem c-Class Virtual Connect Firmware OpenSSL libcrypto Library 1.0.2j

        4.65 (Firmware)


        This is a standalone general-purpose cryptography library providing all necessary crypto functionality.

          • FreeScale MPC8535
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4777
        1654Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Hridya Valakkadavil Thilakan
        hridya-valakkadavil.thilakan@hpe.com

        Aprana Shrivastava
        aprana.shrivastava@hpe.com

        HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

        4.71 (Firmware)


        The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

          • PowerPC 440EPx
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4776
        1653FireEye, Inc.
        1440 McCarthy Boulevard
        Milipitas, CA 90655
        USA

        Steve Lanser
        steve.lanser@fireeye.com
        508-983-2505

        FireEye Cryptographic Implementation

        1.0


        The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

          • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4775
        1652Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Linda Gallops
        linda.gallops@oracle.com
        +1 704.972.5018
        Fax: +1 980.355.5399

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 6 NSS without AES-NI

        R6-1.0.0


        Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

          • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3918
        1651wolfSSL Inc
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Larry Stefonic
        larry@wolfssl.com
        206-369-4800

        wolfCrypt

        3.12.2


        wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel® Xeon® E5335 w/ Windows Server 2012R2
          • Intel® Core™ i7-2640M w/ Windows 7 Professional SP1
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3915
        1650IBM Corporation
        1787 Sentry Pkwy West
        Building 18, Suite 200
        Blue Bell, PA 19422
        USA

        Sandeep Singhal
        Sandeep.Singhal1@ibm.com
        215-664-1614

        OpenSSL for the IBM MaaS360 Cloud Extender

        2.91


        The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

          • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4771
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #3914
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384
          • Prerequisite: HMAC #3182
        1649Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto Virtual

        F6.0


        FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

          • Intel Xeon E series w/ ESXi 6.0
          • Intel Xeon E series w/ ESXi 5.5
        9/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4768
        1648Bomgar Corporation
        578 Highland Colony Parkway
        Paragon Centre, Suite 300
        Ridgeland, MS 39157
        USA

        Faye Santangelo
        FSantangelo@bomgar.com
        6016078322

        Bomgar Cryptographic Engine

        2.0.13 (Firmware)


        The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

          • Intel® Xeon E5-2640 v3
        9/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4767
        1647SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using assembler implementation for AES

        3.0


        This test covers assembler implementation of AES

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/15/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4766
        1646SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AES-NI for AES

        3.0


        This test covers AES-NI implementation of AES

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/15/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4765
        1645SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using SSE3 implementation for SHA

        3.0


        This test covers SSSE3 implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3911
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3179
        1644SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using generic C implementation

        3.0


        This test covers generic C implementation of multiple algorithms.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3910
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3178
        1643SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AVX implementation for SHA

        3.0


        This test covers AVX implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: SHS #3909
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3177
        1642SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AVX2 implementation for SHA

        3.0


        This test covers AVX2 implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: SHS #3908
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3176
        1641Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4764
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3907
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3175
        1640Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (AES-NI and AVX+SSSE3 for SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4763
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #3906
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: HMAC #3174
        1639Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (SSSE3 Assembler for AES and SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4762
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #3905
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: HMAC #3173
        1638FireEye, Inc.
        1440 McCarthy Boulevard
        Milipitas, CA 90655
        USA

        Steve Lanser
        steve.lanser@fireeye.com
        508-983-2505

        FireEye SSL

        1.0 (Firmware)


        The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

          • Intel Xeon
          • Intel Xeon with ESXi 6.5
          • Intel Atom
          • AMD Opteron
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4761
        1637VMware, Inc.
        3401 Hillview Ave
        Palo Alto, CA 94303
        USA

        Manoj Maskara
        mmaskara@vmware.com
        650-427-1000
        Fax: 650-475-5001

        Michael McKay
        mmckay@vmware.com
        650-427-3615
        Fax: 650-475-5001

        VMware BC-FJA (Bouncy Castle FIPS Java API)

        1.0.0


        The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

          • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
        9/1/2017
        • Counter:
          • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4760, TDES #2530
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3902
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3171
        1636Legion of the Bouncy Castle Inc.
        85 The Crescent
        Ascot Vale, Victoria 3032
        Australia

        David Hook
        dgh@bouncycastle.org
        +61438170390

        Jon Eaves
        jon@bouncycastle.org
        +61417502969

        Bouncy Castle FIPS Java API

        1.0.1


        The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

          • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
          • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
        9/1/2017
        • Counter:
          • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4759, TDES #2529
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #3901
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: HMAC #3170
        1635Software Diversified Services
        1322 81st Ave NE
        Minneapolis, MN 55432
        USA

        Tim Full
        cavp@sdsusa.com

        SDS Cryptographic Module

        1.0


        Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

          • Intel i7 with AES-NI w/ Windows Server 2012 R2
          • Intel i7 with AES-NI w/ Windows Server 2016
          • Intel i7 with AES-NI w/ RedHat 6.9
          • Intel i7 with AES-NI w/ RedHat 7.4
          • POWER8 w/ AIX 6.1
          • POWER8 w/ AIX 7.2
        9/1/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3167
        1634Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna K7 Accelerated Cryptographic Library

        7.0.1 (Firmware)


        The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

          • PowerPC 476
        9/1/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4753
        1633A10 Networks, Inc.
        3 West Plumeria Drive
        San Jose, CA 95134
        USA

        John Chiong
        +1 408 325-8668

        A10 Networks Data Plane FIPS Software Library

        3.0.0 (Firmware)


        The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

          • Intel Xeon E3-1275v2 with AES-NI
          • Intel Xeon E5-1650v3 with AES-NI
          • Intel Xeon E5-2697v2 with AES-NI
          • Intel Xeon E5-2697v4 with AES-NI
        9/1/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4752
        1632Monkton, Inc
        2236 Central Ave
        Tysons, VA 22182
        USA

        Harold E. Smith III
        harold@monkton.io
        571-527-6680

        OpenSSL

        1.0.2L


        Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton''s Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

          • Apple A10X w/ iOS 10.3.2
          • Apple A10 Fusion w/ iOS 10.3.2
        8/25/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4751
        1631SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        Ray Potter
        ray@safelogic.com
        650-646-1702

        CryptoComply Server Engine

        2.2


        CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

          • Intel Celeron w/ CentOS 7.3
        8/25/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4750
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3893
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3164
        1630ARM Ltd
        110 Fulbourn Road
        Cambridge CB1 9NJ
        United Kingdom

        Leo Dorrendorf
        leo.dorrendorf@arm.com
        +972-52-6818594
        Fax: +972-73-2558808

        Udi Maor
        udi.maor@arm.com
        +972-54-4205101
        Fax: +972-73-2558808

        ARM TrustZone Cryptocell 712 TEE

        CC 712 TEE


        ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

          8/25/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4749
          1629Ixia
          26601 W. Agoura Road
          Calabasas, California 91302
          USA

          Tom Casella
          NVSCertificationTeam@ixiacom.com
          703-288-0184

          NTO Crypto Library

          1.0.1-1 (Firmware)


          The NTO Crypto Library performs all cryptographic functionality for the NTO 7303 and Vision ONE appliances, including asymmetric key generation, symmetric encryption, hashing, digital signatures, and provides TLSv1.2 protocols and SNMPv3 privacy and authentication protocols.

            • Intel i7 3555LE
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3891
          1628Nuvoton Technology Corporation
          No. 4, Creation Rd. III
          Hsinchu Science Park 300
          Taiwan, R.O.C.

          Yossi Talmi
          yossi.talmi@nuvoton.com
          +972-9-9702364
          Fax: +972-9-9702001

          Oren Tanami
          oren.tanami@nuvoton.com
          +972-9-9702390
          Fax: +972-9-9702001

          Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

          LAG019


          Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

            • N/A
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3890
          1627Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          JungHa Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Samsung Kernel Cryptographic Module

          1.7.1


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • Samsung Exynos 7870 w/ Android 7.1 (Kernel 3.18)
          8/25/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3159
          1626Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (64 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3885
          1625Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (32 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3884
          1624IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4738
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3883
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3155
          1623IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4737
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3882
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3154
          1622IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4736
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3881
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3153
          1621IBM Corporation
          1 New Orchard Road
          Armonk, NY 10504
          USA

          Peter Szczepankiewicz
          peter.s14@us.ibm.com
          757-689-0507
          Fax: 757-689-0507

          Rory Bray
          rory.bray@ca.ibm.com
          506-449-7810
          Fax: 506-449-7810

          libcrypto/openssl

          1.0.1e


          Main crypto provider for all standard QRadar functionality

            • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
          8/25/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4735
          1620IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4734
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3879
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3151
          1619IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4733
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3878
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3150
          1618IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4732
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3877
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3149
          1617IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4731
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3876
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3148
          1616IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4730
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3875
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3147
          1615IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4729
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3874
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3146
          1613IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4727
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3872
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3144
          1612IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4726
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3871
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3143
          1611IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4725
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3870
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3142
          1610IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4724
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3869
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3141
          1609Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3137
          1608Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- Quicksec

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3136
          1607DELL, INC
          5450 Great America Parkway,
          Santa Clara, CA 95054
          US

          Srihari Mandava
          srihari_mandava@dell.com

          Jeff Yin
          Jeff_Yin@Dell.com

          Dell OpenSSL Cryptographic Library

          2.4


          Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''''s Data Center hardened Dell Networking OS management and routing features.

            • Intel Atom C2000 w/ Dell EMC Networking OS 10.3.1
          8/18/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4718
          1606CA Technologies Canada
          500-885 West Georgia St
          Vancouver, BC V6C 3G1
          Canada

          Alina Muresan
          mural05@ca.com
          604 235 8305

          Julia Kazakova
          kazju01@ca.com
          604-235-8354

          CA API Gateway Cryptographic Library - OpenSSL

          v9.2.00


          Provides cryptographic functionality for the CA API Gateway.

            • Intel Xeon w/ RHEL6 on VMware ESXi 5.5.0
            • Intel Xeon w/ RHEL6
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4429
          1605Forcepoint
          10900-A Stonelake Blvd.
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (3305) without AESNI

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
          8/18/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4716
          1604Yubico
          420 Florence St, Ste 200
          Palo Alto, CA 94301
          USA

          Jerrod Chong
          jerrod@yubico.com

          Jakob Ehrensvard
          jakob@yubico.com

          Yubico HW/FW DRBG

          SLE78CLUFX3000PH e58230b8 (Firmware)


          This module implements required SP800-90A hardware/firmware functions for instantiate, generate and reseed, including initial reseed from built-in hardware TRNG.

            • Infineon SLE78V2
          8/11/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4713
          1603Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/11/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3129
          1602Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/11/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3128
          1601Trend Micro Inc.
          11305 Alterra Parkway
          Austin, TX 78758
          USA

          Paul Tucker
          paul_tucker@trendmicro.com
          512-633-7945

          TippingPoint Crypto Core OpenSSL

          2.0.13


          The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

            • Intel Core i3 without PAA w/ Linux 4.4
            • Intel Xeon with PAA w/ Linux 4.4
            • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4703
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3850
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3115
          1600SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          SafeLogic Inside Sales
          sales@safelogic.com
          (844) 436-2797

          CryptoComply Java Engine

          3.0.1


          CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

            • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
          8/11/2017
          • Counter:
            • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4702, TDES #2494
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3849
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3114
          1599Allwinner Technology Co.,Ltd
          No.9 Technology Road 2, High-Tech Zone
          Zhuhai, Guangdong 519085
          China

          Qing Zhang
          qingzhang@allwinnertech.com
          +86-756-3818333
          Fax: +86-756-3818358

          Wei Guo
          guowei@allwinnertech.com
          +86-756-3818333
          Fax: +86-756-3818358

          Crypto Engine

          V2.0


          Crypto engine is implemented with Veilog HDL. It provides cryptographic functions.

            • N/A
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3848
          1598Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4700
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3847
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3112
          1597Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4699
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3846
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3111
          1596Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4698
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3845
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3110
          1595Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4697
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3844
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3109
          1594Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4696
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3843
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3108
          1593Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4695
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3842
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3107
          1592LG Electronics, Inc.
          20 Yoido-dong
          Youngdungpo-gu
          Seoul 152-721
          Republic of Korea

          Jongseong Kim
          jongseong.kim@lge.com
          82-10-4535-0110
          Fax: 82-2-6950-2080

          LG BoringSSL

          2.0


          General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

            • Snapdragon 835 (MSM8998) w/ Android 7.1.2
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4691
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3841
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3106
          1591NetBrain Technologies, Inc
          15 Network Drive 2nd Floor
          Burlington, Massachusetts 01803
          United States

          Michael Passanisi
          Michael.Passanisi@netbraintech.com
          781-221-7199 (x2055)
          Fax: +1 (781) 998-5800

          Boyang Zhang
          boyang.zhang@netbraintech.com
          781-221-7199 (x2059)

          NetBrain OpenSSL Cryptographic Module

          1.0


          The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

            • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4690
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3840
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3105
          1590Taisys Technologies Co. Ltd.
          7F., No.56, Lane 321
          Yangguang St., Neihu Dist.
          Taipei, Taipei 11491
          Taiwan (R.O.C.)

          Joe Wang
          joe.wang@taisys.com
          +886-2-26270927x6699
          Fax: +886-2-26270619

          Kent Horng
          kent.horng@taisys.com
          +886-2-26562185 #206
          Fax: +886-2-26579657

          TAISYS JUISE-S2

          ST33G1M2


          The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

            • N/A
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3838
          1589BiObex, LLC
          11501 Sunset Hills Rd
          Suite 200
          Reston, VA 22190
          USA

          Arthur Joyce
          ajoyce@biobex.com
          571-313-0969

          SAFE-Key device

          1.1.0.0 (Firmware)


          The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

            • STM32F415
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3837
          1588Sonus Networks, Inc.
          4 Technology Park Drive
          Westford, MAS 01886
          USA

          Keith Conger
          kconger@sonusnet.comkconger@sonusnet.com
          978-614-8115

          Adam Elshama
          aelshama@sonusnet.com
          978-614-8327

          Sonus Cryptographic Library version 3.0

          5.1.2


          Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

            • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4686
          1587Motorola Solutions Inc
          1301 East Algonquin Road
          Schaumburg, IL 60196
          USA

          Amalendu Roy
          aroy@motorolasolutions.com
          888-325-9336

          Ken Fuchs
          Ken.Fuchs@motorolasolutions.com
          888-325-9336

          Motorola Solutions Cryptographic Software Module

          libALG_R01.03.00


          The module is a comprehensive suite of FIPS Approved and non-Approved algorithms and delivered to the end customer(s) as a Dynamically Linked Library (DLL) which is the logical boundary of the cryptographic module. The module provides cryptographic functionalities in Motorola Solutions ASTRO IP Dispatch Console products.

            • Intel Core i7-6820HQ CPU w/ Microsoft Windows 10 Professional Version 10.0.14393
            • Intel Core i7-6820HQ CPU w/ Microsoft Windows 7 Professional Version 6.1.7601 Service Pack 1
          8/11/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4683
          1586SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of SHA

          2.0


          The test covers implementations of sha1-generic, sha224-generic, sha256-generic,, sha384-generic,, sha512-generic,.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3833
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3098
          1585SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using CPACF for AES core, TDES core and SHA

          2.0


          This test covers the implementations of gcm_base(ctr(aes-s390),ghash-generic), ccm_base(ctr(aes-s390),aes-s390), cbc(aes-s390), ecb(aes-s390), xts(aes-s390), kw(aes-s390), cmac(aes-s390),cbc(des3_ede-s390), ctr(des3_ede-s390), ecb(des3_ede-s390), cmac(des3_ede-s390), sha1-s390, sha224-s390, sha256-s390, sha384-s390, sha512-s390.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4682
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3832
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3097
          1584SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of AES

          2.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4681
          1583Cisco Systems, Inc.
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon on VMware ESXi 5.5
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4680
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3831
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3096
          1582SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using CPACF for AES, TDES and GHASH

          2.0


          This test covers implementations of gcm_base(ctr-aes-s390,ghash-s390), ccm_base(ctr-aes-s390,aes-s390), cbc-aes-s390, ecb-aes-s390, xts-aes-s390, cbc-des3_ede-s390, ecb-des3_ede-s390, ctr-des3_ede-s390.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4677
          1581Cisco Systems, Inc.
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4676
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3830
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3095
          1580ForeScout
          190 West Tasman Drive
          San Jose, CA 95134
          USA

          Ayelet Kutner
          cavp@forescout.com

          BC-FJA (Bouncy Castle FIPS Java API)

          1.0.0


          The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

            • Intel Celeron J1900 w/ CentOS 6.6
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3827
          1579Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4667
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3824
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3091
          1578Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4666
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3823
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3090
          1577RSA, The Security Division of EMC
          174 Middlesex Turnpike
          Bedford, MA 01730
          USA

          Rohit Mathur
          rohit.mathur@rsa.com
          +61730325220

          RSA BSAFE Crypto-C Micro Edition

          4.1.3.2


          RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

            • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4665
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3089
          1576Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4664
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3821
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3088
          1575Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_64_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4585
          1574Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4584
          1573Nokia
          600 March Rd
          Ottawa, Ontario K2K 2E6
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Non Datapath Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Non Datapath Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon Plus
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4657
          1572Nokia
          600 March Rd
          Ottawa, Ontario K2K 2E6
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon Plus
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4656
          1571Nokia
          600 March Rd.
          Ottawa, Ontario k0A 2Z0
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon II
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4655
          1570Evertz Microsystems
          5292 John Lucas Dr.
          Burlington, Ontario L7L 5Z9
          Canada

          Bruce Mathews
          brucematthews@evertz.com
          540-778-3287

          IPX OpenSSL Cryptographic Module

          2v0_b1 (Firmware)


          Card for 6RU Shelf loaded with Evertz IPX

            • MPC8377E
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4652
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3811
          1569Evertz Microsystems
          5292 John Lucas Dr.
          Burlington, Ontario L7L 5Z9
          Canada

          Bruce Matthews
          BruceMatthews@evertz.com
          540-778-3287

          MAGNUM OpenSSL Cryptographic Module

          1.16.0 (Firmware)


          1RU Server loaded with Evertz MAGNUM control

            • Intel Xeon
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4651
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3810
          1568Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux 7 NSS without AES-NI

          R7-2.0.0


          Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

            • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3808
          1567Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4644
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3807
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3076
          1566wolfSSL Inc
          10016 Edmonds Way
          Suite C-300
          Edmonds, WA 98020
          USA

          Todd Ouska
          todd@wolfssl.com
          503-679-1859

          Larry Stefonic
          larry@wolfssl.com
          206-369-4800

          wolfCrypt

          3.11.2


          wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • NXP i.MX6 Quad w/ Android Dalvik 4.2.2
            • NXP i.MX50 (Device Tree Support) w/ Linux 4.1.15
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3806
          1565DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          ezer@arx.com
          972-39279529
          Fax: 972-39230864

          Moshe Harel
          Moshe.Harel@docusign.com
          972-3-9279578
          Fax: 972-3-9230864

          PrivateServer

          5.0.2 (Firmware)


          PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

            • Intel Xeon Quad-Core
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3073
          1564Feitian Technologies Co., Ltd.
          Floor 17, Tower B, Huizhi Mansion
          No.9 Xueqing Road
          Haidian, Beijing 100085
          China

          PENG Jie
          pengjie@ftsafe.com
          +8610 62304466-419
          Fax: +8610 62304477

          WenSheng Ju
          wensheng@ftsafe.com
          +8610 62304466-527
          Fax: +8610 62304477

          DRBG

          1.0 (Firmware)


          DRBG is implemented following SP800-90A, CTR DRBG. Its crypto algorithm is 3DES. The seeding implementation uses Derivation function.

            • M7893 (Infineon Technologies AG SLx78)
          8/4/2017
          • Counter:
            • Modes: 3KeyTDEA
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: TDES #1899
          1563Trusted Concepts
          205 Van Buren St
          Suite 440
          Herndon, VA 20170
          USA

          Chris Greenlee
          chris.greenlee@trustedconcepts.com
          202.680.3718

          TrustedKeep Encryption Module

          1.8.3


          TrustedKeep is a secure object storage and sharing solution.

            • Intel Core i7 w/PAA w/ CentOS 7.3
            • Intel Core i7 w/o PAA w/ CentOS 7.3
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4637
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3801
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3070
          1562Security First Corp.
          29811 Santa Margarita Parkway
          Suite 600
          Rancho Santa Margarita, CA 92688
          USA

          Rick Orsini
          rorsini@securityfirst.com
          949-585-7525
          Fax: 949-858-7092

          Secure Parser Library

          4.7.1.10


          The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library

            • Intel Atom x5 on GETAC MX50 w/ Android 5.1.1
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4636
          1561wolfSSL Inc
          10016 Edmonds Way
          Suite C-300
          Edmonds, WA 98020
          USA

          Todd Ouska
          todd@wolfssl.com
          503-679-1859

          Larry Stefonic
          larry@wolfssl.com
          206-369-4800

          wolfCrypt

          3.11.2


          wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • Intel Xeon 1275v3 w/ Debian 8.8
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3799
          1560Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3067
          1559Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3066
          1558Google, Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Titan Key FIPS officer
          titan-key-fips-officer@google.com

          Titan Key

          1.0


          Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

            • N/A
          7/28/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3065
          1557Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Petra Manche
          +44 1189 245470

          Chris Brych
          +1 613.216.3078

          Oracle ILOM OpenSSL FIPS Object Module

          2.0.10


          Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 1402 as a software module, multichip standalone module embodiment.

            • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
            • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
            • Oracle ILOM SP V4 (ARM V5) without PAA w/ Oracle ILOM OS v3.0
          7/28/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4629
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3793
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3064
          1556Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

          10.0.15063


          The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/28/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4627
          1555Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

          10.0.15063


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4624
          1554Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Timothy McDonough
          timothy.mcdonough@hpe.com

          Hewlett Packard Enterprise SSL Crypto Module Engine

          2.1


          Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

            • ARM i.MX6 w/ Yocto Linux 3.0.35
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4624
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3790
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3061
          1553SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES, SHA and GHASH from CPACF

          3.0


          This test covers CPACF implementation of AES, SHA and GHASH.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4623
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3789
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3060
          1552SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

          3.0


          This test covers assembler implementation of AES, SHA and GHASH.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4622
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3788
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3059
          1551SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using SSSE3 for SHA

          2.0


          The test covers implementations of sha1-ssse3, sha224-ssse3, sha256-ssse3, sha384-ssse3, sha512-ssse3.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3786
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3058
          1550SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of SHA

          2.0


          The test covers implementations of sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3785
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3057
          1549SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using AVX2 for SHA

          2.0


          The test covers implementations of sha1-avx2, sha224-avx2, sha256-avx2, sha384-avx2, sha512-avx2.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3784
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3056
          1548McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com
          972-963-7326

          McAfee NSP NS Crypto Lib

          2.0.5_8.1.17.30 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliances

            • Intel Xeon E5 Family
            • Intel Atom C Family
          7/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4619
          1547SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernle Crypto API using AVX for SHA

          2.0


          The test covers implementations of sha1-avx, sha224-avx, sha256-avx, sha384-avx, sha512-avx.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3782
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3054
          1546SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using AES_NI for AES core and CLMUL for GHASH

          2.0


          The test covers implementations of gcm_base(ctr-aes-aesni,ghash-clmulni), ccm_base(ctr-aes-aesni,aes-aesni), cbc(aes-aesni), ecb(aes-aesni), xts(aes-aesni), kw(aes-aesni), cmac(aes-aesni).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4614
          1545SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using strict assembler for AES core

          2.0


          This test covers the implementations of gcm_base(ctr(aes-asm),ghash-generic), ccm_base(ctr(aes-asm),aes-asm), cbc(aes-asm), ecb(aes-asm), xts(aes-asm), kw(aes-asm), cmac(aes-asm).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4611
          1544SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of AES

          2.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4608
          1543Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x7416
          Fax: 613-225-9951

          Fortinet FortiOS RBG Cryptographic Library

          5.4 (Firmware)


          This document focuses on the firmware implementation of the Fortinet FortiOS RNG Cryptographic Library v5.4 running on Intel x86 compatible processors.

            • ARM v5 Compatible (SoC2)
            • ARM v7 Compatible (SoC3)
            • Intel Celeron
            • Intel Xeon E5
            • Intel i3
            • Intel i5
            • Intel i7
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #200928-0-N-00
          1542Hewlett Packard Enterprise
          1160 Enterprise Way
          Sunnyvale, CA 94089
          USA

          Indra Fitzgerald
          indra.fitzgerald@hpe.com
          541-360-6218

          HPE Atalla Cryptographic Subsystem

          1.20 (Firmware)


          The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

            • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4600
          1541Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Ian Hall
          Ian_hall@symantec.com
          703-598-6876

          Diana Robinson
          diana_robinson@symantec.con
          845-454-6397

          SG VA Cryptograpchic Library

          4.1.1


          The SG VA Crypto Library provides the necessary cryptographic services developed specifically for use in the Secure Web Gateway appliance line.

            • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4596
          1540SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES-NI for AES, and PCLMULQDQ for multiplication and GHASH

          3.0


          This test covers AES-NI for AES, and PCLMULQDQ for multiplication and GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4595
          1539SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SHA assembler

          3.0


          This test covers generic assembler implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3771
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3045
          1538SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SSSE3 for SHA

          3.0


          This test covers SSSE3 implementation of SHA-1, SHA-224, SHA-256.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256
            • Prerequisite: SHS #3770
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256
            • Prerequisite: HMAC #3044
          1537SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AVX for SHA

          3.0


          This test covers AVX implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3769
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3043
          1536SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AVX2 for SHA

          3.0


          This test covers AVX2 implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3768
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3042
          1535SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH

          3.0


          This test covers OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4594
          1534Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (3305)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4593
          1533Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (2105)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4592
          1532Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (325)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4591
          1531SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES assembler for AES, and PCLMULQDQ for GHASH

          3.0


          This test covers AES assembler for AES, and PCLMULQDQ for multiplication and GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4588
          1530IBM Corporation
          2455 South Road
          Poughkeepsie, New York 12601-5400
          USA

          John Monti
          jmonti@us.ibm.com
          845-435-4164

          IBM z/OS(R) Cryptographic Services ICSF PKCS #11

          OA52336


          ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

            • IBM z13 w/ IBM z/OS(R) v2.2
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: SHS #3761
          1529Cisco Systems, Inc
          170 W Tasman Drive
          San Jose, California 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          IOS Common Cryptographic Module (IC2M)

          Rel5 (Firmware)


          The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

            • MIPS64
            • Intel Atom
            • Intel Xeon on ESXi 5.5
            • PPC405
            • PPCe500
            • PPCe5500
            • Intel Core i3
            • Intel Pentium
            • Intel Xeon
            • PPC465
          7/8/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4583
          1528Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Libgcrypt (C implementations) Intel x86 32 bit

          5.0


          Libgcrypt (C implementations) Intel x86 64 bit

            • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
          7/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4581
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3757
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3031
          1527Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Libgcrypt (C implementations) Intel x86 64 bit

          5.0


          Libgcrypt (C implementations) Intel x86 64 bit

            • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
          7/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4580
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3756
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3030
          1526IBM Corporation
          2455 South Road
          Poughkeepsie, New York 12601-5400
          USA

          John Monti
          jmonti@us.ibm.com
          845-435-4164

          Alyson Comer
          comera@us.ibm.com
          607-429-4309

          IBM(R) z13(TM) CP Assist

          FC 3863 EC P00339 Drv 27I


          The IBM z System(TM) CP Assist for Cryptographic Function (CPACF) provides processor-integrated hardware acceleration for TDES, AES, DRBG and SHA variants.

            • N/A
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: SHS #3661
          1525L3 Communications Canada / Targa Systems Division
          2081 Merivale Road
          Ottawa, ON K2G1G9
          Canada

          Dave Saunders
          Dave.Saunders@l-3com.com
          613-727-9876
          Fax: 613-727-1705

          Series 4 Gen 3 DTU

          1.0.0-32004093 (Firmware)


          Network Attached Storage device with removable storage.

            • Freescale P1022
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3755
          1524Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0


          The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
          7/8/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4577
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3754
          1523F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4576
          1522F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4575
          1521F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.3.4


          Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4574
          1520F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4573
          1519F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4572
          1518F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AESNI and SHA SSSE3

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4571
          1517F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4570
          1516F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4569
          1515F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4568
          1514F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4567
          1513F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4566
          1512F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.3.4


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4565
          1511Futurex
          864 Old Boerne Road
          Bulverde, TX 78163
          USA

          Futurex Security Certifications
          certifications@futurex.com
          830-980-9782

          OpenSSL

          6.2.0.0 (Firmware)


          The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

            • TI AM3352
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4564
          1510NetApp, Inc.
          495 East Java Drive
          Fourth Floor
          Sunnyvale, CA 94089
          USA

          Mike Scanlin
          Michael.Scanlin@netapp.com
          919.476.8578
          Fax: 919.476.4272

          NetApp Cryptomod

          2.0


          NetApp CryptoMod will be integrated into select NetApp ONTAP releases for the purpose of supporting FIPS 140-2 compliant data-at-rest encryption and key management.

            • Intel Xeon E5 w/ Data ONTAP 9.2
            • Intel Xeon E5 w/ Data ONTAP 9.2 without PAA
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4563
          1509Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Kelvin Desplanque
          kdesplan@cisco.com
          6137887216

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          6/23/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4561
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3739
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3013
          1507Google, Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          24e5886c0edfc409c8083d10f9f1120111efd6f5


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • POWER9 w/ Ubuntu Linux 17.04
            • POWER8 w/ Ubuntu Linux 17.04
            • Intel Xeon E5 w/ Ubuntu Linux 16.04
            • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
            • POWER8 without PAA w/ Ubuntu Linux 15.04
          6/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4558
          1506Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN9000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3734
          1505Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN6000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel ATOM
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3733
          1504Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
          312 Kings Way
          South Melbourne, Victoria 3205
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN8000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel Xeon
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3732
          1503Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3731
          1502Symantec Corporation
          305 Ellis Street
          Mountain View, CA 94043
          USA

          Ian Hall
          Ian_hall@symantec.com
          703-598-6876

          Diana Robinson
          diana_robinson@symantec.con
          845-454-6397

          SGOS Cryptographic Library

          4.1.1


          The SGOS Crypto Library provides the necessary cryptographic services to a proprietary operating system (SGOS 6.7) developed specifically for use in the ProxySG, Reverse Proxy and ASG.

            • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
            • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
            • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
            • Intel Xeon E5 Broadwell w/ SGOS 6.7
          6/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4552
          1501Ultra Electronics AEP
          419 Bridport Road
          Greenford, Middlesex UB6 8UA
          United Kingdom

          Paul Kettlewell
          paul.kettlewell@ultra-cis.com
          +44 (0) 208 813 4461

          Vicky Hayes
          vicky.hayes@ultra-cis.com
          +44 (0) 208 813 4649

          Advanced Configurable Crypto Environment v3

          011395 v3 r4 (Firmware)


          The AEP Networks Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Plus.

            • P2020 QorIQ
          6/16/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256, SHA-512
            • Prerequisite: SHS #3728
          1500Bivio Networks, Inc.
          4457 Willow Road, Suite 240
          Pleasanton, CA 94588
          USA

          Raj Srinivasan
          raj@bivio.net
          (925) 924-8608
          Fax: (925) 924-8650

          OpenSSL

          1.0.1e-51


          OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

            • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4549
          1499Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0 (Firmware)


          The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Atom C2358
            • Intel Xeon D-1548 (Intel Broadwell-DE)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4547
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3725
          1498DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          Ezer.Farhi@docusign.com
          972-3-9279529

          DocuSign-SA-Main

          8.4 (Firmware)


          DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

            • Intel® Xeon Quad-Core
          6/16/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2999
          1497GE MDS, LLC
          175 Science Parkway
          Rochester, NY 14620
          USA

          Aaron Wright
          aaron.wright@ge.com
          585-242-8354
          Fax: 585-241-5590

          Alex Charissis
          alex.charissis@ge.com
          585-242-8402
          Fax: 585-241-5590

          Mocana DSF

          5.5 (Firmware)


          Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

            • Freescale IMX 6 (ARM)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4540
          1496GE MDS, LLC
          175 Science Parkway
          Rochester, NY 14620
          USA

          Aaron Wright
          aaron.wright@ge.com
          585-242-8354
          Fax: 585-241-5590

          Alex Charissis
          alex.charissis@ge.com
          585-242-8402
          Fax: 585-241-5590

          OpenSSL

          Fips-2.0.12 (Firmware)


          Open source Secure Sockets Layer cryptographic API and associated self-test routines.

            • Freescale IMX 6 (ARM)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4539
          1495Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4538
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3719
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2996
          1494Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4537
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3718
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2995
          1493Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AES and SHA1 assembler

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4536
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3717
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2994
          1492Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AES and SHA1 assembler

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4535
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3716
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2993
          1491Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL VPAES and SHA1 SSSE3

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4534
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3715
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2992
          1490Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL VPAES and SHA1 SSSE3

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4533
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3714
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2991
          1489Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

          8.0 (Firmware)


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

            • Cavium Octeon MIPS64
            • Cavium MIPS64
            • Intel Multi Core Xeon
            • Intel Celeron
            • Intel i7
          6/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4532
          1488VMware, Inc.
          3401 Hillview Ave
          Palo Alto, CA 94303
          USA

          Manoj Maskara
          mmaskara@vmware.com
          650-427-1000
          Fax: 650-475-5001

          VMware VMkernel Cryptographic Module

          1.0


          The VMware VMkernel Cryptographic Module is a software cryptographic library that provides FIPS 140-2 approved cryptographic services for VMware products and platforms

            • Intel Xeon without PAA w/ VMWare ESXi 6.7
            • Intel Xeon with PAA w/ VMWare ESXi 6.7
          6/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4531
          1487Amazon Web Services, Inc.
          410 Terry Ave N
          Ste 1200
          Seattle, WA 98109-5210
          USA

          Kelvin Yiu
          kelvinyi@amazon.com

          Ken Beer
          nbeer@amazon.com

          AWS Key Management Service Cryptographic Algorithm Library

          1.0.0 (Firmware)


          The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

            • Intel Xeon E5-2640v4
          6/9/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4527
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3708
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2987
          1486Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA VM-series)

          8.0


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

            • Intel Multi Core Xeon w/ VMware ESXi 5.5
            • Intel Multi Core Xeon w/ Centos 7.2 - KVM
            • Intel Multi Core Xeon w/ Hyper-V 2012 r2
            • Intel Multi Core Xeon w/ AWS EC2
            • Intel Multi Core Xeon w/ Azure
          6/2/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4526
          1485Hewlett Packard Enterprise Company
          3000 Hanover Street
          Palo Alto, CA 94304
          USA

          Luis Luciani
          luis.luciani@hpe.com
          281-518-6762

          Edward Newman
          edward.newman@hpe.com
          281-514-2713

          iLO SSL Firmware Crypto Library

          iLO 5 v1.11 (Firmware)


          HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

            • Cortex A9
          6/2/2017
          • Counter:
            • Modes: AES-128
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4525
          1484Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A10)

          A10


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4523
          1483Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A9X)

          A9X


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4522
          1482Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A9)

          A9


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4521
          1481Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A8X)

          A8X


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4520
          1480Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A8)

          A8


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4519
          1479Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A7)

          A7


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4518
          1478Motorola Solutions Inc
          1301 East Algonquin Road
          Schaumburg, IL 60196
          USA

          Amalendu Roy
          aroy@motorolasolutions.com
          888-325-9336

          Ken Fuchs
          Ken.Fuchs@motorolasolutions.com
          888-325-9336

          Motorola Solutions Cryptographic Software Module

          libALG_R01.01.02


          The Crypto module is a comprehensive suite of FIPS Approved algorithms implemented in C and crossed compiled on Linux build server. The module is delivered to target application team as library which is the logical boundary of the cryptographic module.

            • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Mentor Graphics Nucleus 3.0 (version 2013.08.1)
            • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Texas Instruments (TI) DSP/BIOS 5.41.04.18
          5/19/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4517
          1477Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          Intel Xeon 1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon with AES-NI w/ Windows 7 SP1
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4516
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3704
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2983
          1476Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          Intel Xeon 1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon without AES-NI w/ Windows 7 SP1
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4515
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3703
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2982
          1475TCL Communication Ltd.
          25 Edelman Suite 200
          Irvine, CA 92618
          USA

          Alain Perrier
          alain.perrier@blackberrymobile.com
          214-316-2312

          Nikhil Mhatre
          nikhil.mhatre@alcatelonetouch.com
          954-914-9952

          TCT Random Number Generator

          Snapdragon 625


          Snapdragon 625 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

            • N/A
          5/19/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3700, SHS #3702
          1474Intel Corporation
          2200 Mission College Blvd.
          Santa Clara, California 95054
          USA

          Mark Hanson
          mark.hanson@intel.com
          972.963.7326

          McAfee OpenSSL FIPS Object Module

          1.0.0


          The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

            • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4511
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3699
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2980
          1473VT iDirect
          13681 Sunrise Valley Drive, Suite 300
          Herndon, VA 20171
          USA

          Chris Gormont
          CGormont@idirectgov.com
          703.880.6257

          iDirect Cloak Algorithm Module 1.0

          1.0.2.0 (Firmware)


          VT iDirect, Inc''s firmware cryptographic library provides all cryptographic operations for the support of iDirect''s Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

            • Altera Cyclone V
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3698
          1472Guardtime
          5151 California Ave.
          Suite 210
          Irvine, CA 92617
          USA

          Christian Bravo
          christian.bravo@guardtime.com
          310-227-6558

          Guardtime Cryptographic Support Library (CSL) Direct

          1.0.0 (Firmware)


          Cryptographic library for Guardtime products.

            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4508
          1471Flonidan A/S
          Islandsvej 29
          Horsens, Denmark DK-8700
          Denmark

          Tonny Frederiksen
          twf@flonidan.dk
          +45 75 61 88 88

          Kenneth Sørensen
          ks@flonidan.dk
          +45 75 61 88 88

          Flonidan Smart Meter mbedTLS Module

          2.4.0 (Firmware)


          Crypto module used in Flonidan smart meters

            • ARM Cortex
          5/12/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2978
          1470Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using CPACF for AES, TDES and GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr-aes-s390,ghash-s390), ccm_base(ctr-aes-s390,aes-s390), cbc-aes-s390, ecb-aes-s390, xts-aes-s390, cbc-des3_ede-s390, ecb-des3_ede-s390, ctr-des3_ede-s390.

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4505
          1469Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using CPACF for AES and TDES core, and SHA

          1.0


          This test covers the implementations of gcm_base(ctr(aes-s390),ghash-generic), ccm_base(ctr(aes-s390),aes-s390), cbc(aes-s390), ecb(aes-s390), xts(aes-s390), kw(aes-s390), cmac(aes-s390),cbc(des3_ede-s390), ctr(des3_ede-s390), ecb(des3_ede-s390), cmac(des3_ede-s390), sha1-s390, sha224-s390, sha256-s390, sha384-s390, and sha512-s390.

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4502
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3694
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2977
          1468Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2609 @1699MHz with AES-NI w/ Tintri Linux version 4.4.0.1
          5/12/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4499
          1467Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          This test covers implementations of gcm_base(ctr(aes-generic),ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), cmac(des3_ede)

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4498
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3693
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2976
          1466Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using PowerPC implementation for SHA-1

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-powerpc.

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3692
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2975
          1465Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using Power ISA 2.07 for AES and GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implmentations of gcm_base(p8_aes_ctr,p8_ghash), p8_aes_cbc, and p8_aes_xts.

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4495
          1464Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using Power ISA 2.07 for AES core

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr(p8_aes),ghash-generic), ccm_base(ctr(p8_aes),p8_aes), cbc(p8_aes), ecb(p8_aes), xts(p8_aes), kw(p8_aes), and cmac(p8_aes).

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4492
          1463Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          This test covers the implementations of gcm_base(ctr(aes-generic),ccm_base(ctr(aes-generic),aes-generic),cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), and cmac(des3_ede).

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4489
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3691
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2974
          1462Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using SSSE3 for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-ssse3, sha224-ssse3, sha256-ssse3, sha384-ssse3, and sha512-ssse3.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3690
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2973
          1461Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AVX2 for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-avx2, sha224-avx2, sha256-avx2, sha384-avx2, and sha512-avx2.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3689
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2972
          1460Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AVX for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-avx, sha224-avx, sha256-avx, sha384-avx, and sha512-avx.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3688
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2971
          1459Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AES-NI for AES core and CLMUL for GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr-aes-aesni,ghash-clmulni), ccm_base(ctr-aes-aesni,aes-aesni), cbc(aes-aesni), ecb(aes-aesni), xts(aes-aesni), kw(aes-aesni), and cmac(aes-aesni).

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4484
          1458Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using strict assembler for AES and Triple-DES core

          1.0


          This test covers the implementations of gcm_base(ctr(aes-asm),ghash-generic), ccm_base(ctr(aes-asm),aes-asm), cbc(aes-asm), ecb(aes-asm), xts(aes-asm), kw(aes-asm), cmac(aes-asm), ecb(des3_ede-asm), and cbc(des3_ede-asm).

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4481
          1457Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), cmac(des3_ede)

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4478
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3687
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2970
          1456Cog Systems / HTC
          Level 1
          277 King Street
          Newton
          Sydney, NSW 2042
          Australia

          Daniel Potts
          danielp@cog.systems
          +1 855 662 7234

          D4Secure Boring/OpenSSL FIPS Module

          FIPS Module 2.0.14


          The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

            • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
          5/5/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4476
          1455Qualcomm Technologies, Inc.
          5775 Morehouse Dr
          San Diego, CA 92121
          USA

          Yin Ling Liong
          yliong@qti.qualcomm.com
          858-651-7034
          Fax: 858-845-1523

          QTI Pseudo Random Number Generator (Version 2.3.1)

          Snapdragon 835


          Snapdragon 835 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

            • N/A
          4/26/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3684, SHS #3685
          1454Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 8700 Packetwave Platform

          8.5


          The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch.

            • NXP QorIQ P4080 w/ SAOS 8.5
          4/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4470
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: HMAC #2967
          1453Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung Kernel Cryptographic Module

          1.8


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • MSM 8998 w/ Android 7.0
          4/21/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2938
          1452Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung Kernel Cryptographic Module

          1.8


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • Exynos 8895 w/ Android 7.0
          4/21/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2936
          1451OpenSSL Validation Services, Inc.
          1829 Mount Ephraim Road
          Adamstown, MD 21710
          USA

          Steve Marquess
          marquess@veridicalsystems.com
          301-874-2571

          OpenSSL FIPS Object Module

          2.0.16


          The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

            • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.18
            • Intel Atom C2558 (x86) with AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom C2558 (x86) without AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
            • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
            • NXP T2080 (PPC) w/ Linux 3.12
          4/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4469
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3681
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2966
          1450Trustonic
          20 Station Road
          Cambridge CB1 2JD
          UK

          Alec Edgington
          alec.edgington@trustonic.com
          +44 1223 347864

          Mark Wooding
          mark.wooding@trustonic.com
          +44 1223 3478534

          TRICX

          1.0


          TRICX is a static library providing an extensive suite of FIPS-approved cryptographic algorithms and supporting a range of key sizes and modes.

            • ARM Cortex-A53 without PAA w/ Trustonic Kinibi 400A
            • ARM Cortex-A53 with PAA w/ Trustonic Kinibi 400A
          4/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3680
          1449Axway Inc.
          6811 E Mayo Blvd.
          Ste. 400
          Phoenix, AZ 85054
          USA

          Katrin Rosenke
          krosenke@axway.com
          480-627-1800
          Fax: 480-627-1801

          Kartik Krishnan
          kkrishnan@axway.com
          480-627-2649
          Fax: 480-627-1801

          Axway Security Kernel

          3.0.2


          Axway Validation Authority Suite: a collection of products that provide flexible and robust OCSP/SCVP certificate validation for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions.

            • Intel® Xeon® E5-2620 w/ Microsoft Windows 2012 64-bit
            • Intel® Xeon® E5-2620 w/ RHEL 6.3 64-bit
            • Sun UltraSparc T1 w/ Solaris 64-bit
          4/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4466
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3678
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2964
          1448Silver Spring Networks
          230 W Tasman Drive
          San Jose, CA 95134
          USA

          Jeff Ebert
          jebert@ssni.com
          16697704000
          Fax: 18667760015

          Silver Spring Networks Endpoint Security Module

          130-0117-01.ESM


          Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

            • N/A
          4/14/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: HMAC #2963
          1447A10 Networks, Inc.
          3 West Plumeria Drive
          San Jose, CA 95134
          USA

          John Chiong
          +1 408 325-8668

          A10 Networks SSL FIPS Library

          2.0.0 (Firmware)


          The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

            • Intel Xeon E3-1275v2 with AES-NI
            • Intel Xeon E5-1650v3 with AES-NI
            • Intel Xeon E5-2697v2 with AES-