Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

SHA-3 Validation List

This list identifies implementations that have been validated as conforming to the SHA-3 family of functions, as specified in Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, using the tests found in the Secure Hash Algorithm-3 Validation Suite (SHA3VS).

No. Vendor Implementation Operational Environments Validated Capabilities
63Ixia, a Keysight Business
846 Higuera Street, Suite 2
San Luis Obispo, CA 93401
United States

Fred Strelzoff
fref.strelzoff@keysight.com
(512) 600-5400

Ixia Cryptographic Module

1.0.1


The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Core i7-3555LE w/ Linux 4.12.0
11/9/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
62IBM
10777 Westheimer Rd
Houston, Texas 77042
USA

Glen Jaquette
jaquette@us.ibm.com
(713) 278-6279

IBM FCMv1 FPGA

XCZU19EG


The IBM FS9100 FCM is a NVMe-connected self-encrypting solid-state drive (SSD)

    • N/A
11/2/2018
  • SHA3-384:
61Totemo AG
Freihofstrasse 22
Kuesnacht, Zuerich 8700
Switzerland

Marcel Mock
marcel.mock@totemo.com
+41 (0) 44 914 9900

Totemo Cryptographic Module (TCM)

3.0


The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites.

    • Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
10/19/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
60Broadcom Corp.
270 Innovation Drive
San Jose, CA 95134
United States

Alfonso Ip
Alfonso.ip@broadcom.com
408-922-5624
Fax: 408-922-8050

SMAU Generic Crypto/Hash

BCM5820X


Generic AES operation including CBC, ECB, CRT modes. AES implementation covers 128, 192, 256 bit key lengths. Generates HMAC SHA256 hash when a cryptographic key is passed into the function. Generates SHA256 hash. Generates SHA3 hash.

    • N/A
10/19/2018
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
59Beijing Sansec Technology Development Co., Ltd
26F No.3 Building, Triumph Center, No.170 Beiyuan Road
Chaoyang District
Beijing, Beijing 100101
China

Yongxin Xu
xuyongxin@sansec.com.cn
+86 186 6080 5090

Sansec HSM - CSM Library

1.0.12 (Firmware)


The CSM library implements cryptographic algorithms for data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), and random number generation. The CMS library is part of the Sansec Hardware Security Module (HSM).

    • Intel G3260
9/21/2018
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
58Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Ahmer Sabri
ahmer@google.com
201-341-1408

Offload Engine

SHA3 Module 1.0


Hardware implementation of standard SHA3-224 hash algorithm

    • N/A
8/27/2018
  • SHA3-224:
57Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certification Team
SecurityCertfications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
56Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Windows 10 rs3 32 bits
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
55Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • AMD Ryzen5 w/ Windows 2016 64 bits
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
54Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Windows 10 rs3 64 bits
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
53Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ Mac OS 10.13
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
52Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • Intel Core i5 w/ CentOS 7.4 64 bits
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
51Trend Micro Inc.
8F, No. 198, Tun Hua S. Rd., Sec. 2
Taipei, na 106
Taiwan

Phoenix Liau
Phoenix_Liau@trend.com.tw
+886-2-23789666

Harvey Lee
Harvey_Lee@trend.com.tw

Trend Micro Cryptographic Module Core Library

1.0


Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

    • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
7/20/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
50Infosec Global Inc.
2225 Sheppard Avenue East
Suite 1402
Toronto, Ontario M2J 5C2
Canada

Brian Neill
brian.neill@infosecglobal.com
416-492-3333
Fax: 647-343-6933

Ian Laidlaw
ian.laidlaw@infosecglobal.com
416-492-3333
Fax: 647-343-6933

AgileSec FIPS Provider 1.0

1.0


AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Core i5 CPU with AES-NI w/ OSX 10.12
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Intel Core i5 CPU without AES-NI w/ OSX 10.12
    • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
7/13/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
49SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply for Java

3.0.1


SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
    • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
7/6/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
48Securosys SA
Forrlibuckstrasse 70
Zurich, Zurich 8005
Switzerland

Marcel Dasen
dasen@securosys.ch
+41 44 552 31 33

Robert Rogenmoser
roro@securosys.ch
+41 44 552 31 11

Primus HSM Cryptographic Library

XC7K160T 2.5.3 (Firmware)


Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

    • Marvell Armada XP PJ4Bv7
6/15/2018
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
47REDCOM Laboratories, Inc
One REDCOM Center
Victor, NY 14564-0995
United States

Sal Ceravolo
Sal.ceravolo@redcom.com
585-905-0451

Chris Hasenauer
Chris.hasenauer@redcom.com
585-905-0451

REDCOM Encryption 140-2

3.0.1


REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

    • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
    • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
6/1/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
46KeyNexus, Inc.
205-2657 Wilfert Road
Victoria, BC V9B6A7
Canada

Jason Novecosky
jason@keynexus.net

KeyNexus Cryptographic Library

1.0


The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

    • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
5/25/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
45wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

4.0


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
5/18/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
44D'Crypt Pte Ltd
28 Sin Ming Lane
#06-133 Midview City
Singapore, Singapore 573953
Singapore

Sales & Marketing
marketing@d-crypt.com
(65) 6933-1800
Fax: (65) 6684-5142

Quek Gim Chye
fips@d-crypt.com
(65) 6933-1823
Fax: (65) 6684-5142

D'Crypt Cryptographic Library

3.8 (Firmware)


The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

    • Intel x86 64 bit
    • ARM Cortex-A
5/3/2018
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
43Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
4/27/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
42VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
4/9/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
41Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
2/9/2018
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
40Synopsys, Inc.
690 East Middlefield Road
Mountain View, CA 94043
USA

Dana Neustadter
danan@synopsys.com
+1(613)595-9836

DWC Cryptography Software Library

4.2.0


The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

    • ARC® EM7D Processor with CryptoPack w/ n/a
10/27/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
39VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

Michael McKay
mmckay@vmware.com
650-427-3615
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
9/1/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
38Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.1


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
    • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
9/1/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 0 bits
    • Output Length Max: 65536 bits
37IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
36IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • SPARC T4 w/ Solaris(R) 11 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
35IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
34IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
33IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
32IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
31IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core without PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
30IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
8/25/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
29IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
28IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
27IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
26IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
25IBM(R) Corporation
Seabank Centre
12 - 14 Marine Parade
Southport, QLD 4215
Australia

Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
Fax: +61 7 5571 0420

ICC Algorithmic Core with PAAs

8.6.0.0


ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

    • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
8/18/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
24SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
(844) 436-2797

CryptoComply Java Engine

3.0.1


CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

    • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
8/11/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
23Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D15XX Series

1.0.0 1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor D w/ Red Hat 7.1
8/4/2017
  • SHA3-256:
    • Supports Empty Message
22Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D21XX Series

1.0.0 1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor D w/ Red Hat 7.1
8/4/2017
  • SHA3-256:
    • Supports Empty Message
21Amazon Web Services, Inc.
410 Terry Ave N
Ste 1200
Seattle, WA 98109-5210
USA

Kelvin Yiu
kelvinyi@amazon.com

Ken Beer
nbeer@amazon.com

AWS Key Management Service Cryptographic Algorithm Library

1.0.0 (Firmware)


The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

    • Intel Xeon E5-2640v4
6/9/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
20Xilinx, Inc.
2100 Logic Drive
San Jose, CA 95124
USA

James Wesselkamper
jimwe@xilinx.com
505-798-6863

SHA3/384

Zynq Ultrascale+ MPSoC


SHA3/384 Hard Core

    • VCS
3/31/2017
  • SHA3-384:
    • Supports Empty Message
19Xilinx, Inc.
2100 Logic Drive
San Jose, CA 95124
USA

James Wesselkamper
jimwe@xilinx.com
505-798-6863

SHA3/384

Ultrascale, Ultrascale+


SHA3/384 Hard Core

    • VCS
3/31/2017
  • SHA3-384:
    • Supports Empty Message
18Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0 (Firmware)


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
    • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
3/6/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
17Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Chipset C62X Series

1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Xeon® Processor w/ Red Hat 7.1
2/28/2017
  • SHA3-256:
    • Supports Empty Message
16Intel Corporation
2200 Mission College Blvd.
Santa Clara, California 95054
USA

Costin Alex. Pavel
costin.pavel@intel.com
+353 61 777 683

Alan Carew
alan.carew@intel.com
+353 61 477 487

Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Atom™ Processor C3XXX Series

1.0.0


The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms.

    • Intel® Atom™ Processor w/ Fedora 22 (kernel 4.0.4-301)
2/28/2017
  • SHA3-256:
    • Supports Empty Message
15Information Security Corporation
1011 Lake St. Suite 425
Oak Park, IL 60118
USA

Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

ISC Cryptographic Development Kit (CDK)

8.0


The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

    • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
2/10/2017
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
14NXP Semiconductors
Stresemannallee 101
Hamburg, Hamburg 22529
Germany

Dr. Almar Kaid
almar.kaid@nxp.com
+ 49 (40) 5613 5123
Fax: + 49 (40) 5613 62773

P73N2M0 Crypto Library

p73n2m0b0.200 1.0.8


The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

    • NXP p73n2m0 w/ n/a
2/10/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
13NXP Semiconductors
Stresemannallee 101
Hamburg, Hamburg 22529
Germany

Dr. Almar Kaid
almar.kaid@nxp.com
+ 49 (40) 5613 5123
Fax: + 49 (40) 5613 62773

P73N2M0 Crypto Library

1.0.8


The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

    • NXP p73n2m0 w/ n/a
2/10/2017
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
12Distech Controls, Inc.
4205 Place de Java
Brossard, QC J4Y 0C4
Canada

Dominic Gagnon
dgagnon@distech-controls.com
450-444-9898 Ext.231
Fax: 450-444-0770

François Gervais
fgervais@distech-controls.com
450-444-9898 Ext.263
Fax: 450-444-0770

Distech Java Cryptographic Library

1.0 (Firmware)


The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

    • AM335x Cortex-A8 (ARMv7) /w NEON
12/23/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
11VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
12/16/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
10VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Eric Betts
betts@vmware.com
408-891-0590

Michael McKay
mmckay@vmware.com
408-891-0590

VMware Java JCE (Java Cryptographic Extension) Module

BC FIPS 1.0.0


The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

    • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
    • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
12/2/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
9Attivo Networks, Inc.
47697 Westinghouse Drive, Suite 201
Fremont, CA 94539
USA

Satya Das
510 623-1000

Attivo Cryptographic Provider

1.0


Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

    • Intel(R) Xeon(R) CPU ES-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
10/28/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
8Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Alan Presser
apresser@allegrosoft.com
(978) 264-6600

Allegro Cryptographic Engine

6.2


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel Core i7 without AES-NI w/ Windows 10 Professional
    • Intel Core i7 with AES-NI w/ Windows 10 Professional
    • Intel Core i7 without AES-NI w/ Linux Mint 18
    • Intel Core i7 with AES-NI w/ Linux Mint 18
10/14/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
7Check Point Software Technologies, Ltd.
9900 Belward Campus Drive
Suite 250
Rockville, MD 20850
USA

Malcom Levy
product_certifications@checkpoint.com
+97237534561

Check Point Crypto Core

4.0


Check Point Crypto Core 4.X is a 140-2 Level 1 cryptographic module for Windows and Mac platforms. The module provides cryptographic services accessible in kernel mode and user mode on the respective platforms through implementation of platform-specific binaries.

    • Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
    • Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
    • Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
    • Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
    • Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
    • Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
    • Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
    • Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
10/6/2016
  • SHA3-224:
  • SHA3-256:
  • SHA3-384:
  • SHA3-512:
6Oberthur Technologies
402 rue d'Estienne d'Orves
Colombes 92700
France

GOYET Christophe
c.goyet@oberthur.com
+1 703 322 8951

BOUKYOUD Saïd
s.boukyoud@oberthur.com
+33 1 78 14 72 58
Fax: +33 1 78 14 70 20

SHA on Cosmo V8.1

HW = ‘30’ with FW = ‘5F01’ and HW = ‘40’ with FW = ‘6001’ 06939.18 with 08001.3 (Firmware)


ID-One Cosmo V8.1 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.4 and Global Platform 2.2.1 which supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, as well as SHA-3.

    • ID-One PIV on Cosmo V8.1
10/6/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
5Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.1


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
8/4/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
4Information Security Corporation
1011 Lake St. Suite 425
Oak Park, IL 60118
USA

Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

ISC Cryptographic Development Kit (CDK)

8.0


The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

    • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
    • Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
    • AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
6/21/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
3Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS Java API

1.0.0


The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

    • Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6
    • Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6
    • Intel Xeon E5-2697 V3 w/ Ubuntu 14.04 LTS on VMWare ESXi 6.0
4/1/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
2Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
+61438170390

Jon Eaves
jon@bouncycastle.org
+61417502969

Bouncy Castle FIPS .NET API

1.0.0


The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

    • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
    • Intel Atom w/ Windows 10 Professional 64 bit
    • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
    • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
3/25/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message
  • SHAKE-128:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
  • SHAKE-256:
    • Supports Empty Message
    • Output Length Min: 16 bits
    • Output Length Max: 65536 bits
1Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

CRYPEN IPsec

1.0 (Firmware)


CRYPEN IPsec is embedded within proprietary ASICs that are utilized within Cisco hardware platforms.

    • Synopsys VCS v2014.12mx-SP3-2
3/25/2016
  • SHA3-224:
    • Supports Empty Message
  • SHA3-256:
    • Supports Empty Message
  • SHA3-384:
    • Supports Empty Message
  • SHA3-512:
    • Supports Empty Message