These implementations are validated as conforming to the Secure Hash Algorithms specified in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard (SHS), using tests described in The Secure Hash Algorithm Validation System (SHAVS). These tests validate implementations of SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The testing is handled by NVLAP accredited Cryptographic And Security Testing (CST) Laboratories.
Please note that additional implementations of SHA-1 have been validated in conjunction with Digital Signature Algorithm (DSA) implementations. Those SHA-1 validations are noted on the DSA Validation List. However, all SHA-1 implementations validated after April 23, 2001 appear on the list below.
In addition to a general description of each product, this list mentions the SHA algorithm(s) that were tested. These include SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512.
In cases where the implementation was tested and is validated only for the correct generation of a message digest on byte-oriented data, this is indicated by "(BYTE-only)" in the description field. However, if "(BIT)" is indicated, then the implementation is validated as conforming to the standard for bit-oriented messages (i.e., where the message length does not have to be a multiple of 8 bits). If additional constraints have been placed on a validation, then they are listed in the description field, also.
The list is in reverse numerical order, by validation number, so that the most recent validations are closer to the top of the list.
Validation No. |
Vendor | Implementation | Operational Environment | Val. Date |
Description/Notes |
---|---|---|---|---|---|
3135 | AirTight® Networks 339 N. Bernardo Avenue Suite 200 Mountain View, CA 94043 USA -Hemant Chaskar
|
Version 7.2.FIPS.04 (Firmware) |
Qualcomm AR9558 | 12/28/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) "Implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and DoS attacks." |
3134 | MRV Communications, Inc. 300 Apollo Dr. Chelmsford, MA 01824 USA -Tim Bergeron
-Phil Bellino
|
Version V6.1.0 (Firmware) |
Freescale PQ1 MPC885 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The LX-4000T Series Console Servers provide secure remote service serial port access to devices in an organization''s networks and infrastructures. This nearly eliminates the need for physical presence at a site to correct problems or manage its everyday operation." |
3133 | MRV Communications, Inc. 300 Apollo Dr. Chelmsford, MA 01824 USA -Tim Bergeron
-Phil Bellino
|
Version V6.1.0 (Firmware) |
Freescale PQ1 MPC885 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The LX-4000T Series Console Servers provide secure remote service serial port access to devices in an organization''s networks and infrastructures. This nearly eliminates the need for physical presence at a site to correct problems or manage its everyday operation." |
3132 | Broadcom Corporation 3151 Zanker Road San Jose, CA 95134 USA -Gary Goodman
-Alfonso Ip
|
Part # BCM5810X B0 |
N/A | 12/18/2015 |
SHA-256 
(BYTE-only) "Generic AES operation including CBC, ECB, CRT modes. AES implementation covers 128, 192, 256 bit key lengths. Generates HMAC SHA256 hash when a cryptographic key is passed into the function. Generates SHA256 hash." |
3131 | HP Security Voltage 20400 Stevens Creek Blv Suite 500 Cupertino, CA 95014 USA -Luther Martin
|
Version 5.0 |
CPU Intel Itanium 9300, model NB54000c w/ HP NonStop TNS/E J06.18 - OSS; CPU Intel Xeon E5-2600 v2, model NS7 X1 w/ HP NonStop TNS/X L06.11 - OSS; | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage Cryptographic Module provides the Validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products." |
3130 | Thales e-Security Inc. 900 South Pine Island Road Suite 710 Plantation, FL 33324 USA -sales@thalesesec.com
|
Version 1.0 (Firmware) |
Freescale PowerPC | 12/18/2015 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "The nShield algorithm X library provides cryptographic functionality for Thales nShield Hardware Security Modules." |
3129 | Seagate Technology, LLC. 380 Disc Drive Longmont, CO 80503 USA -Harshad S THakar
|
Version 4.0 (Firmware) |
ARM Cortex-R Family | 12/18/2015 |
SHA-512 
(BYTE-only) "Firmware implementation of Secure Hash Algorithm (SHA-512) in Seagate''s self-encrypting drives (SEDs)." |
3128 | Seagate Technology, LLC. 380 Disc Drive Longmont, CO 80503 USA -Harshad S Thakar
|
Part # Cheops |
N/A | 12/18/2015 |
SHA-256 
(BYTE-only) "Hardware implementation of Secure Hash Algorithms in Seagate''s self-encrypting drives (SEDs)" |
3127 | ClevX, LLC 9306 NE 125th Street Kirkland, WA 98034 USA -Lev Bolotin
-Marc Singer
|
Version 1.0 (Firmware) Part # Datalock® Secured Mass Storage Device |
STMicroelectronics STM32 | 12/18/2015 |
SHA-1     
(BYTE-only) "SHA1 Firmware Library Module" |
3126 | The Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia -David Hook
-Jon Eaves
|
Version 1.0.0 |
Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6; Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well." |
3125 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA |
Version 15.2(1)SY1a (Firmware) |
Intel Core i3; Freescale PowerPC-e500 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "n/a" |
3124 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA |
Version R4.0.2.1 (Firmware) |
Freescale MPC8572E | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Packet Optical Platform Operating System and Management Application" |
3123 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 12/18/2015 |
SHA-512 
(BYTE-only) "Vormetric Data Security Manager that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents." |
3122 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 7.7 (Firmware) |
Intel® Pentium Dual-Core | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
3120 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A9X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3119 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A9 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3118 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A8X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3117 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A8 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3116 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A7 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3115 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A6X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3114 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A6 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3113 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
3112 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A5X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3111 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A5 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
3110 | Realia Technologies, S.L. Infanta Mercedes 90, 4th floor Madrid, Madrid 28020 Spain -Jesus Rodriguez
-Luis Jesus Hernandez
|
Part # 1.1 |
N/A | 12/18/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card." |
3109 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 5.0.4 (Firmware) |
Intel® Pentium Dual-Core | 12/18/2015 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
3108 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
3107 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3106 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
3105 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3104 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
3103 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3102 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3101 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A7 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
3100 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A7 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3099 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A6X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3098 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A6 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3097 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A5X w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3096 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A5 w/ iOS 9 | 12/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
3095 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
3094 | Siemens PLM Software 5800 Granite Parkway Suite 600 Plano, TX 75024 USA -Vikas Singh
|
Version 4.0 |
AMD A4 w/ SUSE Linux 11.2 (x86_64); AMD A4 w/ Windows 7 SP1 (x86); AMD A4 w/ Windows 7 SP1 (x86_64); Intel Core i5 w/ Mac OS X 10.11 (x86_64) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals." |
3093 | V-Key 72 Bendemeer Road #02-20 Luzerne Singapore, Singapore 339941 Singapore -Joseph Gan
|
Version 3.6.0 |
ARMv7A w/ VOS 3.6.0 on Android 4.4.2 w/ Android; ARMv8 w/ VOS 3.6.0 on iOS 7.0.4 w/ iOS | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "A software cryptographic module residing within a trusted virtual machine, V-OS that provides a secure sandboxed operating environment. The Module provides symmetric ciphers including AES and Triple DES, asymmetric cipher RSA, secure hash functions SHA-1 and SHA-256, random number generation, message authentication and key derivation and storage." |
3092 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -n/a |
Part # T2081NSE |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3091 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # T1042NSE |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3090 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # P1020NXE |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3089 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # P1011NSE |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3088 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # P1010NSE |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3087 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # DH8910CC |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3086 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # DH8903CC |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3085 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA |
Part # C2758 |
N/A | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard Firebox security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users" |
3084 | SAP SE Dietmar-Hopp-Allee 16 Walldorf, NRW 69190 Germany -Stephan André
-Thomas Rothe
|
Version 8.4.47.0 |
IBM POWER5 w/ AIX 5.2; IBM POWER7 w/ AIX 6.1 on hypervisor IBM PowerVM 2.2; HP 9000/800/rp3440 w/ HP-UX 11.11; Intel Itanium 2 w/ HP-UX 11.23; Intel Itanium 2 w/ HP-UX 11.31; APM X-Gene Mustang w/ Linux 3.12.0; Intel Itanium w/ Linux 2.6.32; IBM POWER7 w/ Linux 2.6.32 on hypervisor IBM PowerVM 2.2; IBM POWER8 with VCIPHER w/ Linux 3.0.101 on hypervisor IBM PowerVM 2.2; IBM S/390 (2817) w/ Linux 3.0.101 on hypervisor IBM z/VM 6.2.0; AMD Opteron w/ Linux 2.6.5; Intel Xeon with AES-NI w/ Linux 3.0.101 on hypervisor VMware ESXi 5.1.0; UltraSPARC-IIIi w/ SunOS 5.9; SPARC64-V w/ SunOS 5.10; Intel Xeon w/ SunOS 5.10; Intel Xeon w/ Windows Server 2008 SP2; Intel Xeon with AES-NI w/ Windows Server 2008 R2 SP1 on hypervisor VMware ESXi 5.1.0 | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP CommonCryptoLib Crypto Kernel is a shared library, i.e. it consists of software only. SAP CommonCryptoLib Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
3083 | SAP SE Dietmar-Hopp-Allee 16 Walldorf, NRW 69190 Germany -Stephan André
-Thomas Rothe
|
Version 8.4.47.0 |
IBM POWER7 w/ AIX 6.1 on hypervisor IBM PowerVM 2.2; Intel Itanium 2 w/ HP-UX 11.31; IBM POWER7 w/ Linux 2.6.32 on hypervisor IBM PowerVM 2.2; AMD Opteron w/ Linux 2.6.32; Intel Xeon with AES-NI w/ Linux 3.0.101 on hypervisor VMware ESXi 5.1.0; SPARC64-V w/ SunOS 5.10; Intel Xeon w/ SunOS 5.10; Intel Xeon w/ Windows Server 2008 SP2; Intel Xeon with AES-NI w/ Windows Server 2008 R2 SP1 on hypervisor VMware ESXi 5.1.0 | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP CommonCryptoLib Crypto Kernel is a shared library, i.e. it consists of software only. SAP CommonCryptoLib Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
3082 | Thales e-Security Inc. 900 South Pine Island Road Suite 710 Plantation, FL 33324 USA -sales@thalesesec.com
|
Version 1.0 (Firmware) |
Freescale PowerPC | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The nShield algorithm X library provides cryptographic functionality for Thales nShield Hardware Security Modules." |
3081 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # Broadcom XLR |
Motorola PowerQUICC III (e500); Intel Celeron (1.3GH Celeron M) without AES-NI | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3080 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # Broadcom XLP |
Intel Celeron (1.3GH Celeron M) without AES-NI | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3079 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # CN6335 |
Cavium Octeon II (CN6335) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3078 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # CN5650 |
Cavium Octeon Pluss (CN5650) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3077 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # CN5645 |
Cavium Octeon Plus (CN5645); | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3076 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # CN5230 |
Cavium Octeon Plus (CN5230) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3075 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) Part # CN5020 |
Cavium Octeon Plus (CN5020) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3074 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) |
Motorola PowerQUICC III (e500); Intel Celeron (1.3GH Celeron M); Intel Celeron (1.3GH Celeron M); Cavium Octeon II (CN6000 Family); Cavium Octeon CN5645 w/ internal accelerators (HW/FW) | 12/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3073 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Shivakumar Muttur
-Balachandra Shanabhag
|
Version 14.1X53-D30.3 (Firmware) Part # na |
Freescale e500mc PowerPC | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
3072 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Shivakumar Muttur
-Balachandra Shanabhag
|
Version 14.1X53-D30.3 (Firmware) Part # na |
Freescale e500mc PowerPC | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
3071 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Shivakumar Muttur
-Balachandra Shanabhag
|
Version 14.1X53-D30.3 (Firmware) |
Intel Xeon E312XX | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
3070 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Shivakumar Muttur
-Balachandra Shanabhag
|
Version 14.1X53-D30.3 (Firmware) |
Intel Xeon E312XX | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
3069 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3068 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Mahesh Bommareddy
|
Version 12.1X46-D40.4 (Firmware) |
Motorola PowerQUIC III (e500); Intel Celeron (1.3GH Celeron M); Intel Celeron (1.3GH Celeron M); Cavium Octeon II (CN6000 Family); Cavium Octeon Plus (CN5000 Familly) | 12/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
3067 | Bull atos technologies Rue Jean Jaurès Les Clayes sous Bois, . 78340 France -Jean-Luc CHARDON
-Pierre-Jean AUBOURG
|
Version V1.06-00L (Firmware) |
Freescale QorIQ P1010 | 12/4/2015 |
SHA-256 
(BYTE-only) "Bull implements this algorithm for applications running on its CHR hardware platform providing secure cryptographic resources to products developed by Bull or other Application Providers, including the CRYPT2Pay and CRYPT2Protect product lines" |
3066 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 64 bit w/ Red Hat Enterprise Linux 7.1 | 11/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt (C implementations) Intel x86 64 bit" |
3065 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 32 bit w/ Red Hat Enterprise Linux 7.1 | 11/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt (C implementations) Intel x86 32 bit" |
3064 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 64 bit w/ Red Hat Enterprise Linux 7.1 | 11/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt (C implementation) IBM/S390 64 bit" |
3063 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 32 bit w/ Red Hat Enterprise Linux 7.1 | 11/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt (C implementation) IBM/S390 32 bit" |
3062 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
POWER8 LE 64 bit w/ Red Hat Enterprise Linux 7.1 | 11/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt (C implementation) POWER8 LE 64 bit" |
3061 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3060 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
3059 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM Power 8E w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3058 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3057 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
3056 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3055 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
3054 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
3053 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM Power 8E w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3052 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM Power 8E w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
3051 | Hewlett Packard Enterprise Storage 4209 Technology Drive Fremont, CA 94538 USA -Kurt Heberlein
-David Heisser
|
Version 3.2.1.MU3 |
Intel Xeon 5000 family w/ HP 3PAR OS 3.2.1.MU3; Intel Xeon E5 family w/ HP 3PAR OS 3.2.1.MU3 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HP 3PAR OS consist of Debian userspace and RedHat 2.6.32 kernel running on Intel Xeon preocessor families E5 and 5000. libgcrypt11 is built by the upstream vendor from libgcrypt-1.4.5." |
3050 | Hewlett Packard Enterprise 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2.1 (Firmware) |
MPC8349, 553MHz, PowerPC; Broadcom XLS408, 1.2G Hz, MIPS | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
3049 | Hewlett Packard Enterprise Storage 4209 Technology Drive Fremont, CA 94538 USA -Kurt Heberlein
|
Version 3.2.1.MU3 |
Intel Xeon 5000 family w/ HP 3PAR OS 3.2.1.MU3; Intel Xeon E5 family w/ HP 3PAR OS 3.2.1.MU3 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HP 3PAR OS consist of Debian userspace and RedHat 2.6.32 kernel running on Intel Xeon preocessor families E5 and 5000. OpenSSL is built by the upstream vendor from openssl-0.9.8o-squeeze14." |
3048 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 10.0.10586 |
Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November 2015 Update (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November 2015 Update (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November 2015 Update (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November 2015 Update (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November 2015 Update (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November 2015 Update (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x86); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro November 2015 Update (x86); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 November 2015 Update (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro November 2015 Update (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update(x64); Intel Core i7 with AES-NI w/ Windows 10 November 2015 Update(x64); Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise November 2015 Update (x64) | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows RSA32 Library algorithm implementation is used by various Microsoft libraries to provide AES, RSA, and SHS (SHA) support." |
3047 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 10.0.10586 |
Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November 2015 Update (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November 2015 Update (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November 2015 Update (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November 2015 Update (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November 2015 Update (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x86); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro November 2015 Update (x86); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 November 2015 Update (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro November 2015 Update (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update(x64); Intel Core i7 with AES-NI w/ Windows 10 November 2015 Update(x64); Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise November 2015 Update (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November 2015 Update (x64) | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications." 12/03/15: Added new tested information; |
3046 | Dell Software, Inc. 5455 Great America Parkway Santa Clara, CA 95054 USA -Gary Tomlinson
-Usha Sanagala
|
Version 1.7.0_147 (Firmware) |
7200 (Intel Xeon Sandy Bridge with AES-NI); 6200 (Intel Haswell with AES-NI) | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Using existing Debian Stable Open JDK binaries." |
3045 | Dell Software, Inc. 5455 Great America Parkway Santa Clara, CA 95054 USA -Gary Tomlinson
-Usha Sanagala
|
Version 1.0.1m (Firmware) |
7200 (Intel Xeon Sandy Bridge with AES-NI); 6200 (Intel Haswell with AES-NI) | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "OpenSSL 1.0.1e implementation with minor patches." |
3044 | Dell Software, Inc. 5455 Great America Parkway Santa Clara, CA 95054 USA -Gary Tomlinson
-Usha Sanagala
|
Version 10.7.2 (Firmware) |
7200 (Intel Xeon Sandy Bridge with AES-NI); 6200 (Intel Haswell with AES-NI) | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "AES/TDES/SHA/HMAC derived from OpenSSL implementations." |
3043 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Version 1.1 (Firmware) |
Freescale P102X Series | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Crypto Module" |
3042 | Hewlett Packard Enterprise 14231 Tandem Boulevard Austin, TX 78728 USA -Paul Tucker
-Freddy A. Mercado
|
Version 3.8.2 (Firmware) |
Broadcom XLR; Intel Jasper Forest Quad-core | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint IPS platform operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. The IPS provides cryptographic services to protect the management of the device." 12/10/15: Updated vendor information; |
3041 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 11/27/2015 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) "Vormetric Data Security Manager (Virtual Appliance) that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents" |
3040 | MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA -Brian Mansfield
|
Version OpenSSL 1.0.2d,FIPS 2.0.9 |
Samsung Galaxy Note 4 - SM-N910A w/ Android 5.1; Samsung S4 - SGH-I337 w/ Android 4.4.4; Samsung S5 - SM-G900H w/ Android 4.4.2; Samsung Galaxy Note 3 - SM-N900 w/ Android 4.4.2; Samsung S6 - SM-G920A w/ Android 5.0.2 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) ""General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography" |
3039 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
3038 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
3037 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
3036 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel CoreM w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
3035 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3034 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3033 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3032 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel CoreM w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3031 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3030 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3029 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3028 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel CoreM w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
3027 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3026 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3025 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3024 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Intel CoreM w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3023 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A9X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3022 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A9 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3021 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A8X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3020 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A8 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3019 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A7 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3018 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A6X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3017 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A6 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3016 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A5X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3015 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 6.0 |
Apple A5 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
3014 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
3013 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
3012 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
3011 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
3010 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
3009 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
3008 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
3007 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
3006 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3005 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3004 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3003 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3002 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3001 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
3000 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2999 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2998 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2997 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel Xeon w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2996 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2995 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i7 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2994 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2993 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Intel i5 w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2992 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2991 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Core M w/ OSX 10.11 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2990 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures." |
2989 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures." |
2988 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures." |
2987 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM Power 8E w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures." |
2986 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures." |
2985 | Cleversafe, Inc. 222 South Riverside Plaza Suite 1700 Chicago, Illinois 60606 US -Mark Seaborn
-Jason Resch
|
Version 1.1 |
Intel Xeon without AES-NI w/ ClevOS 3.8.0-FIPS-EDITION | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances." 12/04/15: Updated implementation information; |
2984 | Cleversafe, Inc. 222 South Riverside Plaza Suite 1700 Chicago, Illinois 60606 US -Mark Seaborn
-Jason Resch
|
Version 1.1 |
Intel Xeon with AES-NI w/ ClevOS 3.8.0-FIPS-EDITION | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances." 12/04/15: Updated implementation information; |
2983 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A5X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2982 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A5 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2981 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A6X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2980 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A6 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2979 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A7 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2978 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A7 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2977 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2976 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2975 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2974 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A8 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2973 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2972 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2971 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size." |
2970 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9 w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2969 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM Power 8E w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size." |
2968 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA -Shawn Geddis
|
Version 6.0 |
Apple A9X w/ iOS 9 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2967 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size." |
2966 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size." |
2965 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA |
Version 4.0 |
IBM/S390 w/ Red Hat Enterprise Linux 7.1 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size." |
2964 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA -Patrick Scully
|
Version 1.00 (Firmware) |
HunQ ASIC | 11/27/2015 |
SHA-384 
(BYTE-only) "The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service." |
2963 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA -Patrick Scully
|
Version 2.00 (Firmware) |
Xilinx XC7Z020 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service." |
2962 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA -Patrick Scully
|
Version 2.00 (Firmware) |
Xilinx XC7Z045 | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Ciena 6500 Packet-Optical Platform 4x10G Encryption OTR offers an integrated transport encryption solution providing a protocol-agnostic wirespeed encryption service for use in small to large enterprises or datacenters and also offered through service providers as a differentiated managed service." |
2961 | PMC-Sierra US, Inc. 1380 Bordeaux Drive Sunnyvale, CA 94089 USA -Priya Poosari
-Jerry Wong
|
Part # PM88_60_130 |
N/A | 11/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PMC Cryptographic engine supporting controller-based encryption (CBE) in PMC SPCve12G SAS controllers" |
2960 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version 14.2R3.8 (Firmware) |
Intel Xeon LC5518; Intel Xeon L5238 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
2959 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version 14.2R3.8 (Firmware) |
Intel Xeon LC5518; Intel Xeon L5238 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." |
2958 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Rohit Mathur
|
Version 4.1.2 |
Intel x86 without AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11; Intel x86 without AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MD) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MD) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11; Intel x86 without AES-NI w/ Windows Server 2008 Enterprise (/MD) on vCenter SUSE 11; Intel x86 without AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows Server 2008 Enterprise (/MD) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows 7 Enterprise (/MD) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows Server 2012 Standard R2 (/MT) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows Server 2008 Enterprise (/MT) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows Server 2012 Standard R2 (/MT) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows 7 Enterprise (/MT) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x86 without AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x86 without AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x86 with AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11; Intel x64 without AES-NI w/ Windows Server 2012 Standard R2 (/MD) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows 8 Enterprise (/MT) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows 10 Enterprise (/MD) on vCenter SUSE 11; Intel x64 with AES-NI w/ Windows Server 2012 Standard R2 (/MD) on vCenter SUSE 11; Itanium 2 w/ Windows Server 2008 Enterprise (/MD); Itanium 2 w/ Windows Server 2008 Enterprise (/MT); Intel x86 without AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x64 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Itanium 2 w/ Red Hat Enterprise Linux 5.11; PowerPC 32-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2; PowerPC 32-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2; PowerPC 64-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2; PowerPC 64-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2; Intel x64 without AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11; Intel x64 with AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11; Intel x64 without AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11; Intel x64 with AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11; SPARC v8 w/ Solaris 10; SPARC v8+ w/ Solaris 11; SPARC v9 (T2) w/ Solaris 11; SPARC v9 (T4) without T4 accelerator w/ Solaris 11; Intel x86 without AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x86 with AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x64 without AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x64 with AES-NI w/ Solaris 10 on vCenter SUSE 11; Itanium 2 32-bit w/ HPUX 11.31; Itanium 2 64-bit w/ HPUX 11.31; PA-RISC 2.0 32-bit w/ HPUX 11.31; PA-RISC 2.0W 64-bit w/ HPUX 11.31; PowerPC 32-bit w/ AIX 6.1 on PowerVM 2.2; PowerPC 64-bit w/ AIX 6.1 on PowerVM 2.2; PowerPC 32-bit w/ AIX 7.1 on PowerVM 2.2; PowerPC 64-bit w/ AIX 7.1 on PowerVM 2.2; IBM z196 31/32-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2; IBM z196 64-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2; ARMv7 w/ Fedora Core 20; ARMv7 w/ Ubuntu 12.04 LTS; ARMv8 w/ Fedora Core 22; Intel x86 w/ Android 4.1; ARMv7 w/ Android 4.4; ARMv7 w/ Android 5.1; ARMv8 w/ Android 5.1; PPC 604 w/ VxWorks 6.4; PPC 604 w/ VxWorks 6.7; ARMv4 w/ VxWorks 6.8; SPARC v9 (T4) with T4 accelerator w/ Solaris 11; Intel x64 w/ CentOS 6.6 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." 12/18/15: Added new tested information; |
2957 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Daniel Hayes
-Alan Kaye
|
Version 5.2.4 (Firmware) |
Intel Celeron | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiAnalyzer SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2956 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Daniel Hayes
-Alan Kaye
|
Version 5.2.4 (Firmware) |
Intel Xeon E3; Intel Xeon E5 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiManager SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2955 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Mike Scanlin
|
Version 1.0 |
Intel Xeon with AES-NI (AVA 400 appliance) w/ AVOS v4.0.1; Intel Xeon with AES-NI (AVA 800 appliance) w/ AVOS v4.0.1; Intel Xeon with AES-NI (AVA VM ESXi5.5) w/ AVOS v4.0.1; Intel Xeon with AES-NI w/ Debian Linux 8.1; Intel Xeon without AES-NI w/ Debian Linux 8.1; Intel Xeon with AES-NI w/ FreeBSD 9.1; Intel Xeon without AES-NI w/ FreeBSD 9.1; Intel Xeon with AES-NI w/ Scientific Linux 6.1; Intel Xeon without AES-NI w/ Scientific Linux 6.1; Intel Xeon with AES-NI w/ SUSE Linux 11; Intel Xeon without AES-NI w/ SUSE Linux 11 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NCSM will be integrated into select NetApp operating systems and data management products for the purpose of providing FIPS 140-2 compliant management channel encryption." |
2954 | Utimaco IS GmbH Germanusstraße 4 Aachen, n/a 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version hash1.0.9.0 (Firmware) |
Texas Instruments TMS320C6457 | 11/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HASH Component implements all SHA hash sizes to allow flexibility and efficiency." |
2953 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories No.99, Dianyan Rd. Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 3.7 (Firmware) |
Renesas RS-4 series | 11/9/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "It supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, ECDSA(p-224/256/384), RSA 2048 encrypt/decrypt (including RSA-CRT), RSA signature generation /verification(including RSA-CRT) and APDU command/response encryption and/or MAC." |
2952 | Utimaco IS GmbH Germanusstraße 4 Aachen, n/a 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version smos4.4.3.0 (Firmware) |
Texas Instruments TMS320C6457 | 11/6/2015 |
SHA-512 
(BYTE-only) "SMOS SHA Component implements one SHA hash size to reduce cryptographic complexity of SMOS module as far as possible. SMOS SHA is needed by SMOS for software integrity tests." |
2951 | Utimaco IS GmbH Germanusstraße 4 Aachen, n/a 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version bl4.0.5.0 (Firmware) |
Texas Instruments TMS320C6457 | 11/6/2015 |
SHA-512 
(BYTE-only) "BL SHA Component implements one SHA hash size only to reduce cryptographic complexity of Boot Loader as far as possible. BL SHA is needed by Boot Loader for software integrity tests." |
2950 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 11/6/2015 |
SHA-256 
(BYTE-only) "Vormetric Data Security Manager (Virtual Appliance) that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents" |
2949 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 11/6/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Vormetric Data Security Manager (Virtual Appliance) that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents" |
2948 | INSIDE Secure Arteparc Bachasson, Bât A Rue de la carrière de Bachasson, CS70025 Meyreuil, Bouches-du-Rhône 13590 France -Euan Macdonald
-Jean Fioretti
|
Version 1.2.1 (Firmware) Part # VaultIC405M Rev B |
Intel Core i5 | 11/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "VaultIC (R) are security modules designed to secure applications such as anti-cloning, physical access control, personal access control for multimedia and web applications, hardware authentication, user strong authentication, SSL support, PKCS#11 to Microsoft (R) CSP applications, PKI, DRM, trusted computing and IP protection." |
2947 | Hewlett Packard Enterprise 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V5.2-R2514 (Firmware) |
Freescale P1010, 533M, PowerPC; Freescale P1016, 533M, PowerPC | 11/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2946 | Hewlett Packard Enterprise 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V5.2-R3303 (Firmware) |
Freescale P2020, 1.0GHz, PowerPC w/ Freescale P4080, 1.5GHz, PowerPC accelerator | 11/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2945 | Hewlett Packard Enterprise 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V5.2-R2514 (Firmware) |
Freescale P1010, 553M, PowerPC; Freescale P1016, 667M, PowerPC | 11/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2944 | Century Longmai Technology Co. Ltd 3rd Floor, Gongkong Building No. 1 Wangzhuang Rd Haidian District Beijing, N/A 100083 China -Lemon Yang
|
Part # SCC-X |
N/A | 11/6/2015 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "mToken CryptoID is designed based on a secure smartcard chip that utilizes the in-built mCOS to communicate with computer device via USB interface in a "plug and play" manner. It can realize various Public Key Infrastructure (PKI) applications including digital signature, online authentications, online transactions, software security, etc." |
2943 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA -Steven Ruggieri
-Suzanne Kwak
|
Version 4.10a (Firmware) |
Broadcom XLS108 | 11/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x." |
2942 | Avago Technologies 1320 Ridder Park Drive San Jose, CA 95131 USA -Avinash Mahajan
|
Version 1.0 (Firmware) |
Cadence Incisive Unified Simulator 14.20.009 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "A storage optimized implementation of FIPS approved standard ciphers for data at rest including AES-ECB, AES-CBC, XTS-AES with CTS and SHA-1, SHA-224, SHA-256 and the corresponding HMAC variants for data integrity." |
2941 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Sheena Leake
|
Version 5.3.1 |
Intel Xeon E5530 (2x) w/ RHEL 6.3 Linux on VMware ESXi 5.5 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM MESA (Modular Extensible Security Architecture) is an appliance framework hosting applications in a secure environment and providing all cryptographic or other security-relevant functions to the application. For example: IBM XGS-virtual is a specific application instance hosted in this fashion." |
2940 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Sheena Leake
|
Version 5.3.1 |
Intel Xeon E5530 (2x) w/ RHEL 6.3 Linux on VMware ESXi 5.5 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM MESA (Modular Extensible Security Architecture) is an appliance framework hosting applications in a secure environment and providing all cryptographic or other security-relevant functions to the application. For example: IBM XGS-virtual is a specific application instance hosted in this fashion." |
2939 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA -Ann-Marie Rubin
|
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
2938 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA -Ann-Marie Rubin
|
Version 4.0 |
s390x w/ Red Hat Enterprise Linux 7.1 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
2937 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA -Ann-Marie Rubin
|
Version 4.0 |
ppc64le w/ Red Hat Enterprise Linux 7.1 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
2936 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA -Ann-Marie Rubin
|
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
2935 | Red Hat, Inc. 100 E. Davie Street Raleigh, NC 27601 USA -Ann-Marie Rubin
|
Version 4.0 |
Intel x86 w/ Red Hat Enterprise Linux 7.1 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
2934 | AlienVault, Inc. 1875 S. Grant St. Suite 200 San Mateo, CA 94402 United States -Jim Hansen
|
Version 2.0.9 |
Intel Xeon E5 w/ Debian "Wheezy" 7.8 | 10/30/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "AlienVault USM for Government is a security appliance that provides complete security visibility and compliance management with five essential security capabilities - asset discovery, vulnerability assessment, intrusion detection, netflow, log analysis, and event correlation - into a single console and reporting dashboard." |
2933 | Huawei (Dongguan) Co., Ltd. B2-5 of Nanfang Factory No.2 of Xincheng Rd Songshan Lake Science & Technology Industrial Zone Dongguan, Guangdong 523808 China -Tailiang Hong
-Blue Lee
|
Version OpenSSL 1.0.1h |
HiSilicon K3V3+ w/ Android 5.0 | 10/23/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic module available for Android used by Huawei devices. A variety of cryptographic services are provided, including AES, RSA, SHA, HMAC, CMAC, ECDSA, CTR_DRBG, etc." |
2932 | iboss Cybersecurity 9950 Summers Ridge Rd. Suite 160 San Diego, CA 92131 USA -Peter Martini
-Christopher Park
|
Version 7.1.0.0 (Firmware) |
Intel Xeon E5-1650v2 with AES-NI; Intel Xeon 2x E5-2650 with AES-NI | 10/23/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "FireSphere OpenSSL is a suite of FIPS approved algorithms. The following algorithms are supported: AES 128 and 256, SP800-90A CTR DRBG 128 and 256, RSA SIGVer 1024, 2048, and 3072, RSA SigGen 2048 and 3072, RSA KeyGen 2048 and 3072, SHA and HMAC-SHA 1, 224, 256, 384, and 512, and RSA key wrapping." |
2931 | iboss Cybersecurity 9950 Summers Ridge Rd. Suite 160 San Diego, CA 92131 USA -Peter Martini
-Christopher Park
|
Version 7.1.0.0 (Firmware) |
Intel Xeon E5-1650v2 with AES-NI; Intel Xeon 2x E5-2650 with AES-NI | 10/23/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "FireSphere Java is a suite of FIPS approved algorithms. The following algorithms are supported: AES 128 and 256, RSA SIGVer 1024, 2048, and 3072, SHA and HMAC-SHA 1, 224, 256, 384, and 512, and RSA key wrapping." |
2930 | Qualcomm Technologies, Inc. 5775 Morehouse Dr San Diego, CA 92121 USA -Yin Ling Liong
|
Part # Snapdragon 820 |
N/A | 10/23/2015 |
SHA-256 
(BYTE-only) "The second SHA core for the QTI Snapdragon 820 Pseudo Random Number Generator." |
2929 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Gary Sturdivant
-Eric Betts
|
Version 1.0 |
Intel Xeon E5-2630 w/ Horizon 6, version 6.2 with Sun JRE 1.8 on Windows Server 2012R2 running on VMware vSphere Hypervisor (ESXi) 6.0; Intel Xeon E5-2630 w/ Horizon 6, version 6.2 with Sun JRE 1.8 on Windows 7 SP1 Enterprise (32-bit) running on VMware vSphere Hypervisor (ESXi) 6.0 | 10/23/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Horizon JCE (Java Cryptographic Extension) Module is a versatile software library that implements FIPS 140-2 approved cryptographic services for VMware products and platforms." |
2928 | TrellisWare Technologies, Inc. 16516 Via Esprillo, Suite 300 San Diego, CA 92127 USA -Ei Co
-Chris Litvin
|
Version OpenSSL 0.9.8m (Firmware) |
Texas Instruments OMAP DM3730 | 10/23/2015 |
SHA-256 
(BYTE-only) "Implementation of TrellisWare OpenSSL Crypto in the TW-600/TW-610 (Ocelot) Module" |
2927 | iDirect Government 13921 Park Center Road, Suite 600 Herndon, VA 20171 USA -Chris Gormont
-Tony Tran
|
Version 15.0.2.2 (Firmware) |
Intel EWIXP465BAET 667 MHz | 10/23/2015 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "VT iDirect, Inc''s firmware cryptographic module, Secure Satelite Broadband Solution, provides all cryptographic operations for the management of iDirect''s Transmission Security (TRANSEC) feature. The cryptographic module supports key management algorithms that allow for each member of the network to receive and decrypt data." |
2926 | Motorola Solutions Systems Polska Sp. z o.o. Czerwone Maki 82 Krakow, n/a 30-392 Poland -Tomasz Chmiel
-Tomasz Rypina
|
Version 1.0.1c (Firmware) |
Freescale MPC-7457; Freescale MPC-8568E | 10/23/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "OpenSSL is used to provide the encryption function for S6000 and GGM8000 network devices." |
2925 | Wistron NeWeb Corporation 20 PARK AVE II HSINCHU SCIENCE PARK HSINCHU, n/a 308 Taiwan -Marcus Ting
|
Version 3.6.0 |
Processor : ARM w/ OS : Threadx | 10/23/2015 |
SHA-256 
(BYTE-only) "• use SHA-256, as specified in FIPS 180-4[1], as the Hash function;" |
2924 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version 6.0.2 (Firmware) |
E500mc | 10/16/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade stackable switch delivers the performance, flexibility, and scalability required for enterprise Gigabit Ethernet (GbE) access deployment. It offers market-leading stacking density with up to 12 switches per stack and combines chassis-" |
2923 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 0.6_8.1.17.10 (Firmware) |
Intel Xeon E5-4600 Family | 10/16/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2922 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 0.6_8.1.15.8 (Firmware) |
Broadcom XLR | 10/16/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2921 | Gemalto 6, rue de la Verrerie CS 20001 Meudon Cedex, n/a 92197 France -Gilles ROMME
-Guennole Tripotin
|
Version FM Version 2.1 (Firmware) Part # NXP P60 |
NXP SmartMX2 P60 chip family | 10/16/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "MultiApp V3.1 is a highly secured smartcard platform compliant with the Javacard 2.2.2, GP 2.1.1 & GP 2.2 Amdt D standards, designed to operate with the NXP P60xx chip. It supports: TDES, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH & DRBG SP800-90A algorithms." |
2920 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park, n/a 300 Taiwan, R.O.C. -Yossi Talmi
-Oren Tanami
|
Part # FB5C85E |
N/A | 10/9/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Nuvoton TPM (Trusted Platform Module), a TCG 2.0 compliant security processor with embedded firmware" |
2919 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park, n/a 300 Taiwan, R.O.C. -Yossi Talmi
-Oren Tanami
|
Part # FB5C85D |
N/A | 10/9/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Nuvoton TPM (Trusted Platform Module), a TCG 2.0 compliant security processor with embedded firmware" |
2918 | Hewlett Packard Enterprise 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V5.2-R3303 (Firmware) |
Freescale P2020, 1.0GHz, PowerPC; Freescale P4080, 1.5GHz, PowerPC | 9/30/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2917 | Advanced Card Systems Ltd. Units 2010-2013, 20/F Chevalier Commercial Centre 8 Wang Hoi Road Kowloon Bay Hong Kong, -Andrew Chan
|
Version 3.00 (Firmware) |
ST23YL80 Version PU7 | 9/30/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "ACOS5-64 is an advanced cryptographic module specifically designed for the Public Key Infrastructure (PKI)-based applications. With its powerful cryptographic capabilities, it enhances the security and performance of RSA public key cryptographic operations that are essential to the stringent requirements of high-level security applications." |
2916 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Tohru Iwamoto
|
Part # i1038-D1 |
N/A | 9/30/2015 |
SHA-256 
(BYTE-only) "a library of unique hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba enterprise HDD products and the systems using them a robust and secure data storage environment" |
2915 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 9/30/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Vormetric Data Security Manager that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents" |
2914 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 9/30/2015 |
SHA-256 
(BYTE-only) "Vormetric Data Security Manager that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents" |
2913 | Hewlett-Packard Longdown Avenue Stoke Gifford, Bristol BS34 8QZ United Kingdom -Laura Loredo
-John Drew
|
Version 1.0.1p (FIPS 2.0) (Firmware) |
ARM966E | 9/25/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "AES ECB and CBC: 128/256 bits, encryption/decryption. CTR DRBG with Derivation Function. GCM: 128/256 bits, encryption/decryption. HMAC-SHA-1/224/256/384/512. SP 800-135 KDF - TLS 1.0, 1.1 and 1.2, with SHA-256 and SHA-384. RSA: FIPS 186-2 RSA; GenKey9.31; SigGenPKCS1.5; SigVerPKCS1.5; SigVerPSS. SHA-1/224/256/384/512." |
2912 | Vocera Communications, Inc. 525 Race Street San Jose, CA 95126 USA -Ammath Keunemany
-Crispin Jacob
|
Version 3.0 |
Texas Instruments OMAP-L138 w/ Vocera Embedded Linux v3.0 | 9/25/2015 |
SHA-256 
(BYTE-only) "Vocera B3000n Badge is a wearable hands-free voice-controlled device that provides easy to use and instantaneous communication on a wireless LAN network. The Vocera Cryptographic Module, embedded in the B3000n Badge ensures protected communications using industry-standard secure wireless communication protocols." |
2911 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA -Steven Ruggieri
-Suzanne Kwak
|
Version 4.10 (Firmware) |
Broadcom XLS108 | 9/25/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris'' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x." |
2910 | Ionic Security Inc. 1170 Peachtree Street NE Suite 400 Atlanta, Georgia 30309 USA -Allen Vance
-Kent Rollins
|
Version 1.0 |
Intel Core i7 w/ Windows 7; Intel Xeon E5-2650 w/ CentOS 7.1.1503 | 9/25/2015 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "Ionic Security’s Fusion Platform implements the FIPS Crypto Module for all cryptographic functions such as key pair generation, digital signature generation/ and verification, encryption and decryption, hashing functions, and message authentication." |
2909 | Qualcomm Technologies, Inc. 5775 Morehouse Dr San Diego, CA 92121 USA -Yin Ling Liong
|
Part # Snapdragon 820 |
N/A | 9/25/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Snapdragon 820 Crypto Engine Core is a general purpose cryptographic hardware engine capable of securely processing various confidentiality and integrity algorithms across multiple execution environments." 10/22/15: Updated implementation information; |
2908 | Qualcomm Technologies, Inc. 5775 Morehouse Dr San Diego, CA 92121 USA -Yin Ling Liong
|
Part # Snapdragon 820 |
N/A | 9/25/2015 |
SHA-256 
(BYTE-only) "Snapdragon 820 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG." 10/22/15: Updated implementation information; |
2907 | KONA I Co., Ltd 8F EXCON Venture-Tower, 3, Eunhaeng-Ro, Yeongdeungpo-Gu Seoul, n/a 150-872 Republic of Korea -Irene Namkung
-Sungmin Ahn
|
Version 2.01 (Firmware) |
Infineon SLE97CNFX1M00PE A22 | 9/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Secure Hash Standard compliant one-way (hash) algorithms; SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. HMAC supports generation and verification with SHA-1, SHA-256, SHA-384 and SHA-512." |
2906 | Infineon Technologies AG Alter Postweg 101 Augsburg, BY 86159 Germany -Roland Ebrecht
-Thomas Hoffmann
|
Version 6.80.0113.02 (Firmware) Part # SLB 9670 |
Infineon SLB 9670 security controller IC | 9/18/2015 |
SHA-1     
(BYTE-only) "Infineon Trusted Platform Module 1.2 SLB 9670 is an implementation according to the TPM Main Specification Version 1.2 Revision 116 by Trusted Computing Group." |
2905 | Infineon Technologies AG Alter Postweg 101 Augsburg, BY 86159 Germany -Roland Ebrecht
-Thomas Hoffmann
|
Version 4.80.0411.02 (Firmware) Part # SLB 9660/9665 |
Infineon SLB 9660 or SLB 9665 security controller IC | 9/18/2015 |
SHA-1     
(BYTE-only) "Infineon Trusted Platform Module 1.2 SLB 9660/SLB 9665 is an implementation according to the TPM Main Specification Version 1.2 Revision 116 by Trusted Computing Group." |
2904 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA |
Version 6.13.2 (Firmware) |
ARMv7; Cavium 31XX | 9/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Carrier Ethernet Switching Operating System and Control Application" |
2903 | Acronis International GmbH Rheinweg 9 8200 Schaffhausen, n/a n/a Switzerland -Oleg Mikhalsky
-Anton Enakiev
|
Version 1.0 |
Intel Core i3-3217U without AES-NI w/ Red Hat Enterprise Linux 6.6; Intel Core i3-3217U without AES-NI w/ Red Hat Enterprise Linux 7.1; Intel Core i5-5300U with AES-NI w/ Acronis Virtual Appliance Linux 11.5 on vSphere 5.5; Intel Core i3-3217U without AES-NI w/ Windows 7 Ultimate 32bit; Intel Core i5-5300U with AES-NI w/ Windows 7 Ultimate 64bit; Intel Core i5-5300U with AES-NI w/ Intel Core i5-5300U with AES-NI; Intel Core i5-5300U with AES-NI w/ Windows 8.1 Pro 64bit ; Intel Core i3-3217U without AES-NI w/ Windows 2008 R2 64bit ; Intel Core i3-3217U without AES-NI w/ Windows 2012 R2 64bit | 9/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Acronis AnyData Cryptographic Library (AACL) is a cryptographic software module used in various products Acronis." |
2902 | Zebra Technologies Corporation 475 Half Day Road, Suite 500 Lincolnshire, IL 60069 USA -Brian Stormont
-Gerry Corriveau
|
Version V1.2 (Firmware) |
Freescale i.MX25 (ARMv4) | 9/18/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The 8787 FIPS driver implements HMAC SHA-1 for performing firmware file verification." |
2901 | Unisys Corporation 801 Lakeview Drive Suite 100 Blue Bell, Pennsylvania 19422 USA -Ralph Farina
-Timothy McCaffrey
|
Version 3.13 |
Intel Pentium G3420 w/ Ubuntu 12.04 LTS distribution; Intel Xeon E5-4627v2 w/ Ubuntu 12.04 LTS distribution running on VMware ESXi 5.5; Intel Xeon E5-2697v3 w/ Ubuntu 12.04 LTS distribution | 9/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SHA1, SHA 256/512 implementation written in C, with optional HMAC" |
2900 | Unisys Corporation 801 Lakeview Drive Suite 100 Blue Bell, Pennsylvania 19422 USA -Ralph Farina
-Timothy McCaffrey
|
Version 3.13 |
Intel Xeon E5-2697v3 with SSSE w/ Ubuntu 12.04 LTS distribution; Intel Pentium G3420 with SSSE w/ Ubuntu 12.04 LTS distribution; Intel Xeon E5-4627v2 with SSSE w/ Ubuntu 12.04 LTS distribution running on VMware ESXi 5.5 | 9/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SHA1, SHA 256/512 implementation written in C & assembly utilizing SSSE3 instructions on x86_64 processors that provide the SSSE3 instruction set extension, with optional HMAC" |
2899 | Intel Corporation 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
|
Version 2.0.9 |
Intel i3 w/ Linux x86_64 | 9/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A cryptographic library compiled for Linux on Intel x86_64 compatible processors." |
2898 | B+B Smartworx 707 Dayton Road PO Box 1040 Ottawa, IL 61350 USA -Paul Conway
|
Version 1.0 |
ARM Cortex w/ Conel Linux 5 | 9/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The kernel Crypto API implemented in ConelOS v5 provides services operating inside the Linux kernel with various ciphers and message digests." |
2897 | B+B Smartworx 707 Dayton Road PO Box 1040 Ottawa, IL 61350 USA -Paul Conway
|
Version 1.0 |
ARM Cortex w/ Conel Linux 5 | 9/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major crypto algorithms and Internet security standards." |
2896 | B+B Smartworx 707 Dayton Road PO Box 1040 Ottawa, IL 61350 USA -Paul Conway
|
Version 1.0 |
ARM Cortex w/ Conel Linux 5 | 9/11/2015 |
SHA-256 
(BYTE-only) "The B+B Smartworx OpenSSL Cryptographic Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library version 1.0.1m delivered with ConelOS v5" |
2895 | EMC Corporation 176 South Street Hopkinton, MA 01748 USA -Greg Lazar
-Tom Dibb
|
Part # 362-000-313 |
N/A | 9/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Data at Rest Encryption provides hardware-based encryption in EMC storage systems, protecting information from unauthorized access when drives are physically removed from an EMC storage system. EMC 6Gb/s SAS I/O modules implement AES-XTS 256-bit encryption to encrypt/decrypt data as it is written to and read from all drives in a system." |
2894 | IBM Corporation 80 Bishop Dr., Unit B Fredericton, New Brunswick E3C 1B2 Canada -Sandra Hernandez
-Marie Fraser
|
Version 1.0 (Firmware) |
Intel XEON Ivy Bridge | 9/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The algorithms are implemented by OpenSSL version 1.0.1e provided by RedHat. Additional native bridges are implemented by IBM and allow all QRadar components to make cryptographic request to OpenSSL directly." |
2893 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA -Todd Ouska
-Larry Stefonic
|
Version 3.6.6 |
Intel Core i5 w/ Windows 7 64-bit | 9/4/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." 09/11/15: Updated implementation information; |
2892 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.2 (Firmware) |
Intel Xeon | 8/29/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v5.2 running on Intel x86 compatible processors." |
2891 | General Dynamics C4 Systems 77 A Street Needham, MA 02494 USA -David Aylesworth
|
Version 2.1 (Firmware) |
RMI Alchemy MIPS Processor; Broadcom XLS Processor | 8/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Fortress Cryptographic Implementation suite works in unison to provide security to your wireless and wired networks." |
2890 | Hewlett Packard®, Enterprise 10810 Farnam Drive NBN02 Omaha, NE 68154 USA -Nagesh Kuriyavar
|
Version I-HSS 1.08.01 |
Intel Itanium 9300 w/ Non Stop OS J06.18 | 8/18/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The HP OpenCall HLR Cryptographic Module provides cryptographic services that allows the HP I-HLR to protect sensitive application and subscriber data at rest and during transit." 09/10/15: Updated implementation information; |
2889 | EMC Corporation 176 South Street Hopkinton, MA 01748 USA -Greg Lazar
-Tom Dibb
|
Part # 362-000-312 |
N/A | 8/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Data at Rest Encryption provides hardware-based encryption in EMC storage systems, protecting information from unauthorized access when drives are physically removed from an EMC storage system. EMC 6Gb/s SAS I/O modules implement AES-XTS 256-bit encryption to encrypt/decrypt data as it is written to and read from all drives in a system." |
2888 | Palo Alto Networks 4401 Great America Parkway Santa Clara, California 95054 USA -Richard Bishop
-Jake Bajic
|
Version 7.0 (PAN-OS) |
Intel Multi Core Xeon w/ VMware ESXi 5.5; Intel Multi Core Xeon w/ CentOS 6.5 - KVM; Intel Multi Core Xeon w/ Citrix XenServer 6.1.0 | 8/18/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content." |
2887 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Oliver Galvez
-Peter Tsai
|
Version 5.3.0 (Firmware) |
Intel Xeon | 8/15/2015 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) "Vormetric Data Security Manager that creates, stores and manages security objects such as keys, certificates and access control policies for distributed encryption agents." |
2886 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 10.0.10240 |
Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro (x86); Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise (x64) ;  Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB (x86) | 8/15/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications." 09/17/15: Updated implementation information; |
2885 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Nick Goble
|
Version 1.0.3 |
Intel X3450 Quad Core w/ Linux x86_64; Intel E5620 Quad Core w/ Linux x86_64; Intel E5645 Hex Core w/ Linux x86_64 | 8/15/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Blue Coat SSL Visibility Appliance decrypts multiple streams of SSL content to provide IDS/IPS, logging, forensics, and data loss prevention. This preserves complete network traffic histories necessary for compliance/threat analysis and enables SSL inspection capabilities that close the security loophole created by SSL." |
2884 | Huawei Technologies Co., Ltd Huawei Industrial Base, Bantian Longgang Shenzhen, Guangdong 518129 China -Li Wen
|
Version 1.0 (Firmware) |
n/a | 8/15/2015 |
SHA-256 
(BYTE-only) "The module provides the functionality of cipher (AES-CCM) transceiver of radio data as security function." |
2883 | Huawei Technologies Co., Ltd Huawei Industrial Base, Bantian Longgang Shenzhen, Guangdong 518129 China -Li Wen
|
Version 1.0 (Firmware) |
n/a | 8/15/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Huawei AR Crypto Module (AR160 Series) provides comprehensive security, performance and reliability for network environments." |
2882 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA -Todd Ouska
-Larry Stefonic
|
Version 3.6.1 |
ST Micro STM32F w/ FreeRTOS 7.6 | 8/15/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." |
2881 | Pure Storage, Inc. 650 Castro Street Suite #400 Mountain View, CA 94041 USA -Marco Sanvido
-Ethan Miller
|
Version 1.1.0 |
Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4 | 7/31/2015 |
SHA-256 
(BYTE-only) "Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." |
2880 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Akihiro Kimura
|
Part # 88SS1032B0-BTJ2C000-P167 |
N/A | 7/31/2015 |
SHA-256 
(BYTE-only) "a library of unique hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba enterprise SSD products and the systems using them a robust and secure data storage environment." |
2879 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Akihiro Kimura
|
Part # 88SS1032B0-BTJ2C000-P167 |
N/A | 7/31/2015 |
SHA-256 
(BYTE-only) "a library of unique hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba enterprise SSD products and the systems using them a robust and secure data storage environment" |
2878 | Alcatel-Lucent 600 March Road Ottawa, Ontario K2K 2E6 Canada -Carl Rajsic
-Alfred Nothaft
|
Version 1.0 (Firmware) |
Cavium CN5845; Cavium CN6635; Cavium CN6645 | 7/31/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Alcatel-Lucent 7x50 SR OS Cryptographic Library is used on the Alcatel-Lucent 7x50 Service Router products." |
2877 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Adam Elshama
-Nui Chan
|
Version 2 (Firmware) |
Intel Ivy Bridge | 7/31/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic software module" |
2876 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Adam Elshama
-Nui Chan
|
Version 2 (Firmware) |
Cavium OCTEON II CN6880 | 7/31/2015 |
SHA-1     
(BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic media module" |
2875 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Adam Elshama
-Nui Chan
|
Version 2 (Firmware) |
Intel Nehalem | 7/31/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic software module" |
2874 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Adam Elshama
-Nui Chan
|
Version 2 (Firmware) |
Cavium OCTEON Plus CN5860 | 7/31/2015 |
SHA-1     
(BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic media module" |
2873 | Huawei Technologies Co., Ltd Huawei Industrial Base, Bantian Longgang Shenzhen, Guangdong 518129 China -Li Wen
|
Version 1.0 (Firmware) |
n/a | 7/31/2015 |
SHA-256 
(BYTE-only) "The module provides the functionality of encryption transceiver of radio data as security function." |
2872 | Huawei Technologies Co., Ltd Huawei Industrial Base, Bantian Longgang Shenzhen, Guangdong 518129 China -Li Wen
|
Version V300R003C22SPC804 |
DELL PowerEdge T100 II Systems Intel Pentium w/ RHEL 5.3 evaluated at EAL4 | 7/31/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)" |
2871 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 10.0.10240 |
Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro (x64); Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro (x64); Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro (x64); Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro (x86) ;  Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64); Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB (x86) | 7/31/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows RSA32 Library algorithm implementation is used by various Microsoft libraries to provide AES, RSA, and SHS (SHA) support." 08/18/15: Updated implementation information and added new testing information; |
2870 | Palo Alto Networks 4401 Great America Parkway Santa Clara, California 95054 USA -Richard Bishop
-Jake Bajic
|
Version 7.0 (PAN-OS, Wildfire)/7.1 (Panorama) (Firmware) |
Cavium Octeon MIPS64; Intel Multi Core Xeon; Intel Celeron P4505; Intel i7 | 8/15/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 firewalls, WF-500 and Panorama M-100/M-500." |
2869 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.2 |
Intel i5 w/ Windows 7 64 bit | 7/24/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CoCo OpenSSL Crypto Module is an OpenSSL cryptographic library that provides cryptographic services to its calling applications." |
2868 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Nick Goble
|
Version 1.0.2 |
Intel X3450 Quad Core w/ Linux x86_64; Intel E5620 Quad Core w/ Linux x86_64; Intel E5645 Hex Core w/ Linux x86_64 | 7/24/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Blue Coat SSL Visibility Appliance decrypts multiple streams of SSL content to provide IDS/IPS, logging, forensics, and data loss prevention. This preserves complete network traffic histories necessary for compliance/threat analysis and enables SSL inspection capabilities that close the security loophole created by SSL." |
2867 | Redline Communications, Inc. 302 Town Centre Blvd., 4th Floor Markham, Ontario L3R OE8 Canada -Andrew Spurgeon
-Weixiong Lin
|
Version 3.1 (Firmware) |
Cavium ECONA CNS3411 SoC | 7/17/2015 |
SHA-384 
(BYTE-only) "Implements ECC-based certificate device authentication, used by RDL-3000 systems to validate the identities of the devices at either end of a wireless connection." |
2866 | Redline Communications, Inc. 302 Town Centre Blvd., 4th Floor Markham, Ontario L3R OE8 Canada -Andrew Spurgeon
-Weixiong Lin
|
Version 3.1 (Firmware) |
Cavium ECONA CNS3411 SoC | 7/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Provides several cryptographically-secure management interfaces for use in the administration and operation of the RDL-3000 platform." |
2865 | N/A | N/A | N/A | 7/17/2015 | N/A |
2864 | N/A | N/A | N/A | 7/17/2015 | N/A |
2863 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park, n/a 300 Taiwan, R.O.C. -Yossi Talmi
-Oren Tanami
|
Part # FB5C85E |
N/A | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Nuvoton TPM (Trusted Platform Module), a TCG 1.2 compliant security processor with embedded firmware" 09/30/15: Updated implementation information; |
2862 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.5 Update 2 |
Intel Xeon w/ 64 bit VMware ESXi | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware ESXI Services Cryptographic Engine provides cryptographic functions for VMware ESXi services." |
2861 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.5 Update 2 |
Intel Xeon w/ 64 bit VMware ESXi | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware ESXI Core Cryptographic Engine provides cryptographic services for VMware ESXi." |
2860 | Certicom Corp. 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada -Certicom Support
-Certicom Sales
|
Version 2.8.8 |
Intel Xeon w/ CentoOS Linux 7.0 64 bit with Oracle JRE 1.8.0 | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications." |
2859 | Certicom Corp. 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada -Certicom Support
-Certicom Sales
|
Version 1.0 |
ARMv8 Qualcomm MSM8992 w/ Android 5.1; Intel Xeon E5620 with AES-NI w/ CentOS 7 Linux 64-bit; | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder Linux Kernel Crypto Core provides general-purpose cryptographic services to other Linux kernel modules." |
2858 | Zebra Technologies Corporation 3 Overlook Point Lincolnshire, IL 60069 USA -Tom McKinney
-Erv Comer
|
Version 1.03 |
TI OMAP4 w/ Android KitKat 4.4.4 | 7/10/2015 |
SHA-256 
(BYTE-only) "Firmware loader library (libfirmware_loader.so) implements SHA256 and HMAC-SHA256." 07/31/15: Updated vendor information; |
2857 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Bumhan Kim
|
Version SKC1.6 |
ARMv7 w/ Android Lollipop 5.1 | 7/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2856 | Samsung 129 Samsung-ro Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 South Korea -Changsup Ahn
-Jisoon Park
|
Version 0.2.9 Part # NA |
Intel Core i7 w/ Ubuntu 14.04 | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on." |
2855 | Samsung 129 Samsung-ro Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 South Korea -Changsup Ahn
-Jisoon Park
|
Version 0.2.9 Part # NA |
Samsung Hawk-MU w/ Tizen 2.3 | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on." |
2854 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.5 Update 2 |
Intel Core i5 w/ Microsoft Windows 7 SP1 64 bit; Intel Core i5 w/ Linux x64 | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vSphere vCLI Cryptographic Engine provide cryptographic services for the VMware Command Line Interface (vCLI)" |
2853 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version Version 5.5 Update 2 |
Intel Xeon w/ SLES 11 SP2 for VMware 64bit | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vCenter Server Virtual Appliance Cryptographic Engine provides the cryptographic services for VMware''s vCenter Server Virtual Appliance." |
2852 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version Version 5.5 Update 2 |
Intel Xeon w/ Microsoft Windows Server 2012 R2 | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vSphere Cryptographic Engine provides the cryptographic services for multiple VMware server and client applications." |
2851 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version Version 5.5 Update 2 |
Intel Core i5 w/ Windows 7 SP1 (64bit) | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vSphere Client Cryptographic Engine provides cryptographic services VMware vSphere Client." |
2850 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.5 Update 2 |
Intel Xeon w/ Microsoft Windows Server 2012 R2; Intel Xeon w/ SLES 11 SP2 for VMware 64bit | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vCenter Server Java Cryptographic Engine provides the cryptographic services for VMware vCenter Server." |
2849 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.5 Update 2 |
Intel Xeon w/ Microsoft Windows Server 2012 R2; Intel Xeon w/ SLES 11 SP2 for VMware 64bit | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware vCenter Server Java Cryptographic Engine provides the cryptographic services for VMware vCenter Server." |
2848 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications." |
2847 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.11 |
Intel Core 2 Duo (x86) w/ VxWorks 6.7; IBM POWER 7 (PPC) w/ AIX 7.1 64-bit; IBM POWER 7 (PPC) w/ AIX 6.1 32-bit; IBM POWER 7 (PPC) w/ AIX 6.1 64-bit; IBM POWER 7 (PPC) w/ AIX 7.1 32-bit; Intel Xeon E5-2420 (x86) without AES-NI w/ DataGravity Discovery Series OS V2.0; Intel Xeon E5-2420 (x86) with AES-NI w/ DataGravity Discovery Series OS V2.0 ; IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 32-bit; IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 64-bit; Intel Xeon E5-2430L (x86) with AES-NI optimizations w/ Ubuntu 12.04; Intel Xeon E5-2430L (x86) without optimizations w/ Ubuntu 12.04; Intel Atom E3845 (x86) without AES-NI optimizations w/ Linux 3.10 32-bit; Intel Atom E3845 (x86) with AES-NI optimizations w/ Linux 3.10 32-bit | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 08/04/15: Added new tested information; |
2846 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -David Suksumrit
-Savitha Naik
|
Version 11 (Firmware) |
IBM PowerPC | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in ViaSat''s Enhanced Bandwidth Efficient Modem (EBEM-500)." |
2845 | Rajant Corporation 400 East King Street Malvern, PA 19355 USA -Martin Lamb
|
Version 11.4.0-FIPS (Firmware) Part # ME4-2409 |
Cavium CNS3420 | 6/26/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BreadCrumb by Rajant Corporation is an 802.11 (Wi-Fi) and Ethernet compatible wireless mesh networking device that allows for rapid deployment of mobile wireless networks in a wide variety of environments. It is lightweight, capable of communicating via up to four different radio frequencies, and is designed to be completely mobile." |
2844 | Rajant Corporation 400 East King Street Malvern, PA 19355 USA -Martin Lamb
|
Version 11.4.0-FIPS (Firmware) Part # LX4-2495; LX4-2954 |
Intel XScale IXP435 | 6/26/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BreadCrumb by Rajant Corporation is an 802.11 (Wi-Fi) and Ethernet compatible wireless mesh networking device that allows for rapid deployment of mobile wireless networks in a wide variety of environments. It is lightweight, capable of communicating via up to four different radio frequencies, and is designed to be completely mobile." |
2843 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
-Adam Wick
|
Version 3.10.49 |
Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ 5.1 | 6/26/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services." |
2842 | Canon One Canon Park Melville, NY 11747 USA -Jiuyuan Ge
|
Version 2.1.1 |
Intel Atom Processor D410 w/ MontaVista Linux | 6/25/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Canon imageRUNNER Crypto Module for MEAP is a cryptographic module which protects stored and transmitted data using FIPS approved cryptographic algorithms." |
2841 | Seagate Technology LLC. 1280 Disc Drive Shakopee, Minnesota 55379 US -David R Kaiser, PMP
|
Part # Torel |
N/A | 6/25/2015 |
SHA-256 
(BYTE-only) "HW implementation of Secure Hash Algorithms in Seagate''s Self Encryption Disk drives (SEDs)." |
2840 | Dell, Inc 5450 Great America Parkway Santa Clara, CA 95054 US |
Version 2.3 |
Intel Atom S1000 w/ Dell Networking Operating System 9.8(0.0); FreeScale PowerPC e500 w/ Dell Networking Operating System 9.8(0.0); Intel Atom C2000 w/ Dell Networking Operating System 9.8(0.0); Broadcom XLP w/ Dell Networking Operating System 9.8(0.0) | 6/25/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Dell OpenSSL Cryptographic Library v2.3 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features." |
2839 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Version 9.4 (Firmware) |
Intel Atom; Intel Pentium; Intel Core i3; Intel Xeon | 6/25/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." |
2838 | EFJohnson Technologies 1440 Corporate Drive Irving, TX 75038-2401 USA -Marshall Schiring
-Josh Johnson
|
Version 4.0 (Firmware) |
Texas Instruments TMS320C6400 | 6/25/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "SHA is used in the DRBG, ECDSA, and HMAC algorithms as well as firmware integrity power on self-test." |
2837 | FireEye, Inc. 1440 McCarthy Boulevard Milipitas, CA 90655 USA -Peter Kim
|
Version 1.0 (Firmware) |
Intel Xeon; AMD Opteron | 7/2/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances." 07/24/15: Updated vendor information; |
2836 | FireEye, Inc. 1440 McCarthy Boulevard Milipitas, CA 90655 USA -Peter Kim
|
Version 1.0 (Firmware) |
AMD Opteron; Intel Xeon | 6/25/2015 |
SHA-256 
(BYTE-only) "The FireEye Image Signature Verification algorithms are used to verify firmware upgrades for the LMS and CMS appliances." |
2835 | Athena Smartcard Inc. 16615 Lark Ave. Suite 202 Los Gatos, CA 95032 USA -Stéphanie Motré
|
Version I1.0 (Firmware) |
Infineon SLE78 | 6/25/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Athena OS755 is a GlobalPlatform Java Card smart card operating system implementing SHA-1/SHA-2." |
2834 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 6/11/2015 |
SHA-384 
(BYTE-only) SHA-512  (BYTE-only) "SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG." |
2833 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 6/11/2015 |
SHA-384 
(BYTE-only) SHA-512  (BYTE-only) "SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG." |
2832 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG." |
2831 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG." |
2830 | Information Assurance Specialists, Inc. 900 Route 168 Suite C4 Turnersville, NJ 08012 USA -William Morgan
-Keiron Tomasso
|
Version 7a55571 – 2015-05-07 (Firmware) |
Intel Bay Trail with AES-NI | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IAS Router FIPS is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." 12/09/15: Updated vendor and implementation information; |
2829 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Sandy Carielli
|
Version 3.0.0.25 |
ARM11 MPCore (ARMv6k) w/ VxWorks 6.8.2 | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
2828 | Hewlett-Packard Company 1160 Enterprise Way Sunnyvale, CA 94089 USA -Harjit Dhillon
|
Version 6.0.1 OpenSSL 1.1 (Firmware) |
Intel Xeon E5-2600 Family | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HP Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover." |
2827 | Hewlett-Packard Company 1160 Enterprise Way Sunnyvale, CA 94089 USA -Harjit Dhillon
|
Version 6.0.0 OpenSSL 1.0 (Firmware) |
Intel Xeon E5-2600 Family | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HP Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover." |
2826 | Thales e-Security Inc. 900 South Pine Island Road Suite 710 Plantation, FL 33324 USA -sales@thalesesec.com
|
Version 2.61.2 (Firmware) |
Freescale PowerPC | 6/5/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The nShield algorithm library provides cryptographic functionality for Thales nShield Hardware Security Modules" 10/22/15: Updated implementation information; |
2825 | Thales e-Security Inc. 900 South Pine Island Road Suite 710 Plantation, FL 33324 USA -sales@thalesesec.com
|
Version 2.61.2 (Firmware) |
Freescale DragonBall MXL | 6/5/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The MiniHSM Algorithm Library provides cryptographic functionality for the MiniHSM series of Thales hardware security modules." 10/22/15: Updated implementation information; |
2824 | Check Point Software Technologies 5 Ha'solelim Street Tel Aviv, 67897 Israel -Malcolm Levy
|
Version 1.0 (Firmware) |
Intel® Xeon® | 6/5/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library for Check Point Next Generation Security Appliances" |
2823 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA -Todd Ouska
-Larry Stefonic
|
Version 3.6.0 |
Qualcomm Krait 400 as on Samsung Galaxy S5 w/ Android 4.4 | 6/5/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." 10/20/15: Updated implementation information; |
2822 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Tom Nguyen
|
Version APX_UMACE_HW_SHA256_R01.00.00 (Firmware) Part # AT8358Z04 |
Motorola µMace AT8358Z04 (Atmel Manufactured, Family of Motorola µMace AT58Z04) | 6/5/2015 |
SHA-256 
(BYTE-only) "SHA-256 implementation for the µMace cryptographic processor which is used in security modules embedded in Motorola Solutions security products." |
2821 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Tom Nguyen
|
Version APX_UMACE_HMAC_SHA384_R01.00.00 (Firmware) |
Motorola µMace AT8358Z04 (Atmel Manufactured, Family of Motorola µMace AT58Z04) | 6/5/2015 |
SHA-384 
(BYTE-only) "HMAC/SHA-384 implementation for the µMace cryptographic processor which is used in security modules embedded in Motorola Solutions security products." |
2820 | NEC Display Solutions, Ltd. 686-1, Nishioi, Oi-machi Ashigarakami-gun, Kanagawa 258-8533 Japan -Michio Yoshino
|
Version Version 0.90 (Firmware) Part # 3NG70175 |
NEC embedded system | 6/5/2015 |
SHA-1     
(BYTE-only) This implementation only supports up to a 7,640 length. "Cryptographic implementation supports security features for compliance with DCI CTP requirement." |
2819 | NEC Display Solutions, Ltd. 686-1, Nishioi, Oi-machi Ashigarakami-gun, Kanagawa 258-8533 Japan -Michio Yoshino
|
Version Version 0.90 (Firmware) Part # 3NG70169 |
NEC embedded system | 5/22/2015 |
SHA-1     
(BYTE-only) "Cryptographic implementation supports security features for compliance with DCI CTP requirement." |
2818 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Global Certification Team
|
Version 6.0 |
Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ FreeBSD 9.2 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of" 06/01/15: Added new tested information; |
2817 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Global Certification Team
|
Version 6.0 |
Intel Xeon w/ Linux 2.6; Cavium Octeon MIPS64 w/ Linux 2.6; ARMv7 w/ Android 4.4; Intel Core i7 w/ Windows 8.1; Intel Core i7 with AES-NI w/ Windows 8.1 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." 06/01/15: Updated implementation information; |
2816 | Dell Software, Inc. 5455 Great America Parkway Santa Clara, CA 95051 USA -Usha Sanagala
|
Version 6.2.1 (Firmware) |
Cavium Octeon II CN 6640-8core | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Dell(tm) SonicWALL(tm) SuperMassive(tm) Series is Dell''s next-generation firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency." |
2815 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA |
Version 12.1 X46 D20.6 (Firmware) |
Cavium Octeon CN5645 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5020 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5230 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN6335 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLR accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLP accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks, Inc. JUNOS 12.1 X46 for SRX and LN Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy." |
2814 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Luis Luciani
|
Version 2.11 (Firmware) |
ARM-926 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP Integrated Lights-Out 4 (HP iLO 4) built into HP ProLiant Gen8 and Gen9 servers is an autonomous secure management component embedded directly on the server motherboard. iLO SSL Firmware Crypto Library provides the cryptographic operations required for secure communication and management." |
2813 | HyTrust Inc 1975 West El Camino Real Suite # 203 Mountain View, CA 94040 USA -Steve Pate
|
Version OpenSSL 1.0.1m and OpenSSL FIPS 2.0.9 Part # Intel Xeon E3-1241 v3 |
FreeBSD 9.2 and VMware vSphere Hypervisor (ESXi) 5.5.0u2 w/ FreeBSD 9.2 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "HyTrust KeyControl is a secure, active-active key management cluster used for creation, management and delivery of encryption keys to physical and virtual machines where files and data drives are encrypted." 07/28/15: Updated implementation information; |
2812 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2811 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2810 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2809 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2808 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2807 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2806 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2805 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2804 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2803 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2802 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2801 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2800 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Core M w/ OSX 10.10 | 5/22/2015 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2799 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2798 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2797 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2796 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2795 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2794 | HP Security Voltage 20400 Stevens Creek Blv Suite 500 Cupertino, CA 95014 USA -Luther Martin
|
Version 5.0 |
Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz w/ Windows Server 2012 R2 w/o AES-NI | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products." |
2793 | HP Security Voltage 20400 Stevens Creek Blv Suite 500 Cupertino, CA 95014 USA -Luther Martin
|
Version 5.0 |
Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz w/ Windows Server 2012 R2 with AES-NI | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products." |
2792 | HP Security Voltage 20400 Stevens Creek Blv Suite 500 Cupertino, CA 95014 USA -Luther Martin
|
Version 5.0 |
Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz w/ CentOS w/o AES-NI | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products." |
2791 | HP Security Voltage 20400 Stevens Creek Blv Suite 500 Cupertino, CA 95014 USA -Luther Martin
|
Version 5.0 |
Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz w/ CentOS with AES-NI | 5/15/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage Cryptographic Module provides the validated algorithms used by the HP SecureMail, HP SecureFile and HP SecureData families of products." |
2790 | Security First Corporation 29811 Santa Margarita Parkway Suite 600 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 4.7.1.0 |
Qualcomm Snapdragon 800 series (ARMv7) w/ Android 4.4; Qualcomm Snapdragon 800 series (ARMv7) w/ Android 5.0; Intel Core i5 (3rd Gen) with AES-NI disabled w/ Microsoft Windows 7 64-bit; Intel Core i5 (3rd Gen) with AES-NI w/ Microsoft Windows 7 64-bit; AMD E1 with AES-NI disabled w/ Microsoft Windows 8 64-bit; AMD E1 with AES-NI w/ Microsoft Windows 8 64-bit | 5/15/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library." |
2789 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
|
Version 3.4.6 |
Intel x86_64 w/ Linux 3.10.45 | 5/15/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OpenSSL FIPS Object Module 2.0.5 running on Linux 3.10.45 on Intel x86_64 HW" |
2788 | Oracle Communications 100 Crosby Drive Bedford, MA 01730 USA -Nikhil Suares
-Madhu Mathiyalagan
|
Version EC6.4.1M1 (Firmware) |
Intel Core Duo T2500; Intel Celeron M 440; Intel Celeron M 440 | 5/15/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Acme Packet 3820 and 4500 are one rack unit (1U) platforms that feature Oracle’s purpose-built hardware design tightly integrated with Acme Packet OS, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders" |
2787 | LogRhythm 4780 Pearl East Circle Boulder, CO 80301 USA -Emily Dobson
|
Version 6.3.4 |
Intel Xeon E5-2420 w/ Microsoft Windows Server 2008 R2 | 5/15/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This module provides support for secure communications over a network using the OpenSSL library." |
2786 | Northop Grumman M5 Network Security Level 1 218 Northbourne Avenue Braddon, ACT 2612 Australia -Warwick Hoyle
-Kristian Howard
|
Version SCS-100 (Firmware 23) |
Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6);Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6) | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A module that provides a C-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms" |
2785 | Northop Grumman M5 Network Security Level 1 218 Northbourne Avenue Braddon, ACT 2612 Australia -Warwick Hoyle
-Kristian Howard
|
Version SCS-100 (Firmware 23) |
Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6); Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6) | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A module that provides a C-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms" |
2784 | Northop Grumman M5 Network Security Level 1 218 Northbourne Avenue Braddon, ACT 2612 Australia -Warwick Hoyle
-Kristian Howard
|
Version SCS-100 (Firmware 23) |
Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6); Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6) | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A module that provides a Java-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms" |
2783 | IBM 9000 S. Rita Rd. Tucson, AZ 85744 USA -Christine Knibloe
|
Version 38L7468 (Firmware) |
PPC 405 | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM TS1150." 06/23/15: Updated vendor informaton; |
2782 | Ultra Electronics AEP Knaves Beech Business Centre Loudwater, High Wycombe, Buckinghamshire HP10 9UT United Kingdom -Paul Kettlewell
-Vicky Hayes
|
Version 011395 v2 r4 (Firmware) |
P2020 QorIQ | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Ultra Electronics AEP Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Plus." |
2781 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8X w/ iOS 8 | 5/22/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2780 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA |
Version 12.1 X46 D20.6 (Firmware) |
Cavium Octeon CN5645 w/ internal accelerators (HW/FW);Cavium Octeon CN5020 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5230 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN6335 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5645 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLR accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLR accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLP accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6 | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks, Inc. JUNOS 12.1 X46 for SRX and LN Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy." |
2779 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA |
Version 12.1 X46 D20.6 (Firmware) |
Cavium Octeon CN5645 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5020 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN5230 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Cavium Octeon CN6335 w/ internal accelerators (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLR accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLR accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6; Intel Celeron w/ Broadcom XLP accelerator (HW/FW) w/ Junos FIPS Version 12.1 X46 D20.6 | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks, Inc. JUNOS 12.1 X46 for SRX and LN Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy." |
2778 | Nimble Storage Inc. 211 River Oaks Parkway San Jose, CA 95134 USA -Kent Peacock
|
Version 2.0.9 |
Intel ES-2403V2 with AES-NI w/ Linux 2.6; Intel ES-2450V2 with AES-NI w/ Linux 2.6; Intel ES-2470V2 with AES-NI w/ Linux 2.6 | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Nimble Storage OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.9. It is incorporated into the family of Nimble Storage appliances." |
2777 | Dell, Inc 5450 Great America Parkway Santa Clara, CA 95054 US |
Version 2.2 |
Intel Atom C2000 w/ Dell Networking Operating System 9.8(0.0); Intel Atom S1000 w/ Dell Networking Operating System 9.8(0.0); Broadcom XLP w/ Dell Networking Operating System 9.8(0.0); FreeScale PowerPC e500 w/ Dell Networking Operating System 9.8(0.0) | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Dell OpenSSL Cryptographic Library v2.2 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features." |
2776 | Cardiocom, LLC 7980 Century Blvd. Chanhassen, MN 55317 USA -Brian Golden
|
Version CC AM1 v1.0.0 |
Texas Instruments OMAP4430 2X ARM Cortex A9 MP Core w/ Android 4.0.4; Intel Xeon E5620 w/ Windows 2008 R2 x64 | 5/8/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "CC AM 1 supports the FIPS module CC FM TLS/SRTP 1.0 which facilitates secure communication for the TLS and SRTP protocols." |
2775 | Hewlett–Packard Development Company, L.P. 3000 Hanover Street Palo Alto, CA 94304-1185 USA -Mondher Razouane
-Kris Meert
|
Part # 2.0 |
N/A | 4/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "n/a" |
2774 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Main Office
-Victor Wolff
|
Version 1.2.2 (Firmware) |
Intel® Xeon | 6/11/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." |
2773 | Samsung Electronics Co., Ltd. 416, Maetan 3-Dong Youngton Gu Suwon, Gyeonggi 152-848 South Korea -Abraham Joseph Kang
-Bumhan Kim
|
Version 1.0 |
Samsung Electronics Exynos 7420 w/ MOBICORE Tbase 302A | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit." |
2772 | Senetas Corporation Ltd. and SafeNet Inc. 312 Kings Way South Melbourne, Victoria 3025 Australia -John Weston
|
Version 2.6.1 (Firmware) |
Intel ATOM | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services." 05/14/15: Added new tested information; |
2771 | Senetas Corporation Ltd. and SafeNet Inc. 312 Kings Way South Melbourne, Victoria 3025 Australia -John Weston
|
Version 4.6.1 (Firmware) |
Freescale MPC8280 | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CN1000 and CN3000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN1000 and CN3000 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." 05/14/15: Added new tested information; |
2770 | Senetas Corporation Ltd. and SafeNet Inc. 312 Kings Way South Melbourne, Victoria 3025 Australia -John Weston
|
Version 2.6.1 (Firmware) |
ARM Cortex A9 | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CN4010 and CN6010 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN4010 and CN6010 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." 05/14/15: Added new tested information; |
2769 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Julie Ritter
|
Version 4.41 (Firmware) |
Freescale MPC8347 Processor; Freescale MPC8535 Processor | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP BladeSystem is a rack-mount enterprise-class computing infrastructure designed to maximize power while minimizing costs, saving up to 56% of the total cost of ownership compared to traditional infrastructures." 05/08/15: Added new tested information; |
2768 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Ramesh Narayanan
-Rituparna Mitra
|
Version 4.40 (Firmware) |
PowerPC 440EPX processor | 4/17/2015 |
SHA-256 
(BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
2767 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Ramesh Narayanan
-Rituparna Mitra
|
Version 4.40 (Firmware) |
PowerPC 440EPX processor | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
2766 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Ramesh Narayanan
-Rituparna Mitra
|
Version 4.40 (Firmware) |
PowerPC 440EPX processor | 4/17/2015 |
SHA-1     
(BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
2765 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Bumhan Kim
|
Version 1.1 |
ARMv8 w/ Android Lollipop 5.1.1 | 4/17/2015 |
SHA-256 
(BYTE-only) "The driver for the on-the-fly Hardware encryption module to flash memory for Disk/File Encryption solution." 08/28/15: Updated implmentation information; |
2764 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Norman Ng
|
Version 5.2.29344 |
ARMv4i w/ Windows Embedded Handheld 6.5 | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Microsoft Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE, Windows Mobile, and Windows Embedded Handheld. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography." 05/08/15: Updated implementation information; |
2763 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA -Todd Ouska
-Larry Stefonic
|
Version 3.6.0 |
Apple(tm) A8 as on iPhone(tm) 6 w/ iOS 8.1 | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." 04/29/15: Updated implementation information; |
2762 | Sony Mobile Communications Inc. 1-8-15 Kohnan Minato-ku, Tokyo 108-0075 Japan -Takuya Nishibayashi
|
Version 1.0.0 |
Qualcomm Snapdragon 810 (ARMv8) with Cryptographic Instructions w/ Android 5.0; Qualcomm Snapdragon 810 (ARMv8) without Cryptographic Instructions w/ Android 5.0 | 4/17/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xperia Cryptographic Module SHS Component provides cryptographic service for Android mobile device." 05/19/15: Updated implementation information; |
2761 | United States Special Operations Command (USSOCOM) 7701 Tampa Point Boulevard MacDill Air Force Base, Florida 33621-5323 USA -William W. Burnham
|
Version 2.0 |
Qualcomm Snapdragon S2 w/ BlackBerry OS v7.1; Qualcomm Snapdragon S4 w/ BlackBerry OS v10.3; Intel Xeon w/ Microsoft Windows Server 2008 R2 (64-bit); Intel Xeon w/ Microsoft Windows Server 2012 R2 (64-bit); Qualcomm Snapdragon 801 w/ BlackBerry OS v10.3 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Federal Information Processing Standard (FIPS) 140-2 certified, standards-based Suite B Cryptographic Algorithms library that provides an advanced layer of encrypted data-in-transit communications and data-at-rest encryption for the BlackBerry ecosystem." 07/20/15: Updated implementation information; |
2760 | Feitian Technologies Co., Ltd Floor 17, Tower B, Huizhi Mansion, No.9 Xueqing Road Haidian, Beijing 100085 China -PENG Jie
-WenSheng Ju
|
Version 1.0.0 (Firmware) |
M7893 (Infineon Technologies AG& SLx78) | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The hash algorithm implementation consists of three parts: the initialization according to the selected corresponding algorithm; the grouping operation according to the specified algorithm (recovering the data is needed when the data is not grouped in integer times); the last step is to hold the result of all the data." |
2759 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 5.2.17p1 |
Intel Xeon QuadCore w/ Red Hat Enterprise Linux 5 | 4/10/2015 |
SHA-1     
(BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use" |
2758 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 1.0.1 |
Intel Xeon QuadCore w/ Red Hat Enterprise Linux 5 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use." |
2757 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2756 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2755 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2754 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2753 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2752 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6X w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2751 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6 w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2750 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5X w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2749 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5 w/ iOS 8 | 4/10/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2748 | Oracle Communications 100 Crosby Drive Bedford, MA 01730 USA -Nikhil Suares
-Madhu Mathiyalagan
|
Version EC6.4.1 (Firmware) |
Intel Core Duo T2500; Intel Celeron M 440; Intel Core Duo T9400 | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Acme Packet 3820 and 4500 are one rack unit (1U) platforms that feature Oracle’s purpose-built hardware design tightly integrated with Acme Packet OS, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders." |
2747 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Brian Wood
|
Version OpenSSL 1.0.1j |
System LSI Exynos 7420 w/ Android 5.0.2 | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography." |
2746 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Brian Wood
|
Version OpenSSL 1.0.1j |
Qualcomm Snapdragon 805 w/ Android 5.0.1 | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography." |
2745 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -n/a |
Version SKC1.6 |
ARMv7 Qualcomm Snapdragon 805 processor w/ android 5.0.1 | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2744 | Zebra Technologies Corporation 475 Half Day Road, Suite 500 Lincolnshire, IL 60069 USA -Brian Stormont
-Gerry Corriveau
|
Version V1.0 (Firmware) |
Freescale i.MX25 (ARMv4) | 3/27/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The 8787 FIPS driver implements HMAC SHA-1 for performing firmware file verification." |
2743 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Kim Barnes
|
Version 5.3 |
Intel Xeon E5-2658v2 w/ RHEL 6.3 Linux | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network." |
2742 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Kim Barnes
|
Version 5.3 |
Intel Core i7-2600 w/ RHEL 6.3 Linux | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network." |
2741 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Kim Barnes
|
Version 5.3 |
Intel Core i3-2115C w/ RHEL 6.3 Linux | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network." |
2740 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Ferrell Moultrie
-Kim Barnes
|
Version 5.3 |
Intel Pentium B915C w/ RHEL 6.3 Linux | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network." |
2739 | Analog Devices, Inc. One Technology Way Norwood, MA 02062 USA |
Part # ADSP-SC589 |
N/A | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Analog Devices Security Packet Engine provides uniform cryptographic capabilities for the ADSP-SC58x and ADSP-2158x SHARC processor families." 07/01/15:Updated vendor information; |
2738 | Hitachi, Ltd. 322-2 Nakazato Odawara-shi, Kanagawa-ken 250-0872 Japan -Hitachi, Ltd. Storage Systems Development Operation
|
Part # 5.0 |
N/A | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hitachi Storage Encryption Engine provides high speed data at rest encryption for Hitachi Virtual Storage Platform G400/G600/G800." |
2737 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tasha Castaneda
-Steve Klinger
|
Part # CN7010/CN7020/CN7120/CN7125/CN7130/CN7760/CN7770/CN7870/CN7880/CN7890; -AAP, -CP, -SCP options |
N/A | 3/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Cavium OCTEON family of Multi-Core MIPS64 processors has 1 to 48 cores per chip. They integrate next-generation networking I/Os with advanced security, storage, and application hardware acceleration, offering unprecedented throughput and programmability for Layer 2 through Layer 7 processing of intelligent networks." |
2736 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 14.1R4 (Firmware) |
Intel LC5500 and LC3500 Jasper Forest family; Intel L52xx Wolfdale family | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." 03/27/15: Update implementation information; |
2735 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 14.1R4 (Firmware) |
Intel LC5500 and LC3500 Jasper Forest family; Intel L52xx Wolfdale family | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." 03/27/15: Update implementation information; |
2734 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 14.1R4 (Firmware) |
Intel LC5500 and LC3500 Jasper Forest family; Intel L52xx Wolfdale family | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." 03/27/15: Update implementation information; |
2733 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 14.1R4 (Firmware) |
Intel LC5500 and LC3500 Jasper Forest family; Intel L52xx Wolfdale family | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos." 03/27/15: Updated implementation information; |
2732 | Hagiwara Solutions Co., Ltd. 2-5-12 Nishiki Naka-ku, Nagoya, Aichi 460-0003 Japan -Yoshihiro Kito
-Masaki Takikawa
|
Version 1.0 (Firmware) Part # HS310S-FI |
HS310S-FI | 3/20/2015 |
SHA-256 
(BYTE-only) "The Dyakon Crypto Engine is a cryptographic library including the hardware-based data encryption and decryption engine. This cryptographic engine provides the secure data protection and the secure key management found in Hagiwara Solutions storage products." |
2731 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.6 |
ARMv8 w/ Android Lollipop 5.0.2 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2730 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
-Adam Wick
|
Version 1.0.1h |
Qualcomm Snapdragon 800-series w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library." 06/25/15: Added new tested information; |
2729 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
-Adam Wick
|
Version 3.4.0 |
Qualcomm Snapdragon 800-series w/ Android 5.0.1 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services." |
2728 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
-Adam Wick
|
Version 1.0.0 |
Qualcomm Snapdragon 800-series (32-bit) w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services available for Android used by LG devices to provide secured services to Java applications via the Bouncy Castle Java Cryptography Extension provider." 06/25/15: Added new tested information and updated implementation information; |
2727 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API is an open-source software written mainly in C. The module provides various cryptographic services to software components within the Linux kernel. This test covers the generic C implementations of various ciphers." |
2726 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 3/20/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API is an open-source software written mainly in C. The module provides various cryptographic services to software components within the Linux kernel. This test covers AVX2 assembler implementation of SHA-2 on Intel x86 64bit HP hardware." |
2725 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API is an open-source software written mainly in C. The module provides various cryptographic services to software components within the Linux kernel. This test covers the generic assembler implementation of AES and SSSE3 assembler implementation of SHA on Intel x86 64bit HP hardware." |
2724 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 1.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 3/20/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API is an open-source software written mainly in C. The module provides various cryptographic services to software components within the Linux kernel. This test covers the AES-NI implementation of AES and AVX assembler implementation of SHA-2 on Intel x86 64bit HP hardware." |
2723 | Hewlett-Packard (TippingPoint) 14231 Tandem Boulevard Austin, TX 78728 USA -Kevin Pimm
|
Version 3.12.9.1 |
Intel Xeon E5-2620v3 w/ CentOS 5.6; Intel Xeon E5-2690v3 w/ CentOS 5.6 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This implementation represents a version of the FIPS certified Mozilla Network Security Services (NSS) compiled for CentOS 5.6." |
2722 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.0.0 |
Intel E5-2658 v2 2.4 GHz w/ RHEL 6.3 Linux | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
2721 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.0.0 |
Intel Core i7-2600 3.4 GHz w/ RHEL 6.3 Linux | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
2720 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.0.0 |
Intel i3-2115C 2.0 GHz w/ RHEL 6.3 Linux | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
2719 | Hewlett Packard Enterprise 14231 Tandem Boulevard Austin, TX 78728 USA -Kevin Pimm
|
Version 2.0.8 |
Intel Xeon E5-2620v3 w/ CentOS 5.6;Intel Xeon E5-2690v3 w/ CentOS 5.6 | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This implementation represents a version of the FIPS certified Mozilla Network Security Services (NSS) compiled for CentOS 5.6." 12/17/15: Updated vendor and implementation information; |
2718 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.0.0 |
Intel Pentium B915C 1.5 GHz w/ RHEL 6.3 Linux | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
2717 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.0.0 |
Intel Core i7-2600 3.4 GHz w/ Windows Server 2012 R2 64-bit | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
2716 | Hewlett-Packard Company 1160 Enterprise Way Sunnyvale, CA 94089 USA -Indra Fitzgerald
|
Version 6.0.0 (Firmware) |
Intel Xeon E5-2600 Family | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HP Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover." |
2715 | Zoll Medical 269 Mill Rd. Chemlsford, MA 01824 USA -Navid Shaidani
-Bryan Newman
|
Version 2.7.3 (Firmware) Part # * |
Texas Instruments AM3703 Cortex A8 (ARM 7) | 3/20/2015 |
SHA-1     
(BYTE-only) "Python SHA1 implementation is used to assist in generation of a GUID to identify data being sent to the Data Exchange Server." |
2714 | Zoll Medical 269 Mill Rd. Chemlsford, MA 01824 USA -Navid Shaidani
-Bryan Newman
|
Version 2.0.7 (Firmware) Part # * |
Texas Instruments AM3703 Cortex A8 (ARM 7) | 3/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OpenSSL Fips Object Module implements all necessary algorithms required for SSL communications." 10/20/15: Updated implementation information; |
2713 | Relocation Management Worldwide, Inc. 6077 Primacy Pkwy Suite 223 Memphis, TN 38119 USA -Rob Gerwing
|
Version 1.0 |
Intel Xeon E5410 quad core processor w/ Microsoft Windows Server 2012 Standard | 3/13/2015 |
SHA-256 
(BYTE-only) "Microsoft ASP.NET Framework 4.5 Web Application using Microsoft FIPS approved cryptography modules implementation from CERT#1989 and SSL RSADP component." |
2712 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2711 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2710 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2709 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2708 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6X w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2707 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2706 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5X w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2705 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5 w/ iOS 8 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2704 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2702 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.10 |
Apple A7 (ARMv8) 64-bit without NEON and Crypto Extensions w/ iOS 8.1; Apple A7 (ARMv8) 64-bit with NEON and Crypto Extensions w/ iOS 8.1; Freescale P2020 (PPC) w/ VxWorks 6.9; Apple A7 (ARMv8) with NEON w/ iOS 8.1 32-bit; Apple A7 (ARMv8) without NEON w/ iOS 8.1 32-bit; Qualcomm APQ8084 (ARMv7) without NEON w/ Android 5.0 32-bit; Qualcomm APQ8084 (ARMv7) with NEON w/ Android 5.0 32-bit; SAMSUNG Exynos7420 (ARMv8) without NEON and Crypto Extensions w/ Android 5.0 64-bit; SAMSUNG Exynos7420 (ARMv8) with NEON and Crypto Extensions w/ Android 5.0 64-bit | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 04/17/15: Added new tested information; |
2701 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Sandy Carielli
|
Version 6.2 |
Intel Core i7 w/ Windows 8.1 (64-bit); NVIDIA Tegra 3 w/ Android 4.1.2 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" 03/26/15: Added new tested information; |
2700 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2699 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2698 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2697 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2696 | Samsung Electronics co., Ltd. 95, samsung 2-ro Giheung-gu Yongin-si, Gyeonggi-do 446-711 Korea -Jinsu Hyun
|
Part # 1.0 |
N/A | 3/13/2015 |
SHA-256 
(BYTE-only) "SSS is the cryptographic hardware module of Samsung Exynos. This module implements block ciphers (AES and TDES), hashes (SHA-1, SHA-256, SHA-384 and SHA-512), message authentication codes (HMAC and CMAC) and a pseudo random number generator (DRBG)." |
2695 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2694 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Steve Weingart
|
Version 6.4.3-FIPS (Firmware) |
x86-64 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2693 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Steve Weingart
|
Version 6.4.3-FIPS (Firmware) |
x86-64 | 3/13/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2692 | EMC Corporation 176 South Street Hopkinton, MA 01748 USA -Kerry Bellefontaine
|
Part # 303-161-101B-05 |
N/A | 3/6/2015 |
SHA-512 
(BYTE-only) "Data at Rest Encryption provides hardware-based encryption in EMC storage systems, protecting information from unauthorized access when drives are physically removed from an EMC storage system. EMC VMAX 6Gb/s SAS I/O modules implement AES-XTS 256-bit encryption to encrypt/decrypt data as it is written to and read from all drives in the system." |
2691 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -David Suksumrit
-Savitha Naik
|
Version EbemCrypto Version 10 (Firmware) |
IBM Power PC | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implements authentication, key negotiation/generation, and controls FPGA implementation of traffic encryption in ViaSat''s Enhanced Bandwidth Efficient Modem (EBEM-500)." |
2690 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -David Suksumrit
-Savitha Naik
|
Version 1.0.1g (Firmware) |
IBM Power PC | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "All SHA implementations in OpenSSL that are used by the OpenSSH KDF implementation." |
2689 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -David Suksumrit
-Savitha Naik
|
Version SHA-256 FIPS Module v2 (Firmware) |
IBM Power PC | 3/6/2015 |
SHA-256 
(BYTE-only) "Implements the SHA-256 algorithm used to hash user passwords." |
2688 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Intel x86_64 w/ Microsoft Windows Server 2008 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2687 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Intel x86_64 w/ Microsoft Windows Server 2008 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2686 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 with hardware accelerators w/ Ubuntu 14.04 LE | 3/6/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2685 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 w/ Ubuntu 14.04 LE | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2684 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Sparc T4 with hardware accelerators w/ Solaris 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2683 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Sparc T4 w/ Solaris 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2682 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Sparc T4 with hardware accelerators w/ Solaris 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2681 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Sparc T4 w/ Solaris 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2680 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM zSeries s390x with CPACF hardware support w/ SUSE Linux Enterprise Server 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2679 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM zSeries s390x w/ SUSE Linux Enterprise Server 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2678 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM zSeries s390x with CPACF hardware support w/ SUSE Linux Enterprise Server 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2677 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM zSeries s390x w/ SUSE Linux Enterprise Server 11 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/15/15: Updated implementation information; |
2676 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Intel x86_64 w/ Red Hat Linux Enterprise Server 7.0 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2675 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
Intel x86_64 w/ Red Hat Linux Enterprise Server 7.0 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2674 | Hewlett-Packard Company 1160 Enterprise Way Sunnyvale, CA 94089 USA -Indra Fitzgerald
|
Version 0.67 (Firmware) |
AMCC PowerPC440EPx | 3/6/2015 |
SHA-256 
(BYTE-only) "The Atalla Cryptographic Subsystem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities." |
2673 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 with hardware accelerators w/ Red Hat Linux Enterprise Server 7.0 BE | 3/6/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2672 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 w/ Red Hat Linux Enterprise Server 7.0 BE | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2671 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 with hardware accelerators w/ Red Hat Linux Enterprise Server 7.0 BE | 3/6/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2670 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 w/ Red Hat Linux Enterprise Server 7.0 BE | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2669 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 with hardware accelerators w/ IBM AIX 7.1 | 3/6/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2668 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 w/ IBM AIX 7.1 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2667 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 with hardware accelerators w/ IBM AIX 7.1 | 3/6/2015 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2666 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.4.1.0 |
IBM Power8 w/ IBM AIX 7.1 | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 05/08/15: Updated implementation information; |
2665 | Samsung Electronics co., Ltd. 95, samsung 2-ro Giheung-gu Yongin-si, Gyeonggi-do 446-711 Korea -Jinsu Hyun
|
Part # 1.0 |
N/A | 3/6/2015 |
SHA-256 
(BYTE-only) "SSS is the cryptographic hardware module of Samsung Exynos. This module implements block ciphers (AES and TDES), hashes (SHA-1, SHA-256, SHA-384 and SHA-512), message authentication codes (HMAC and CMAC) and a pseudo random number generator (DRBG)." |
2664 | Samsung Electronics co., Ltd. 95, samsung 2-ro Giheung-gu Yongin-si, Gyeonggi-do 446-711 Korea -Jinsu Hyun
|
Part # 1.0 |
N/A | 3/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "SSS is the cryptographic hardware module of Samsung Exynos. This module implements block ciphers (AES and TDES), hashes (SHA-1, SHA-256, SHA-384 and SHA-512), message authentications codes (HMAC and CMAC) and a pseudo random number generator (DRBG)." |
2663 | Axway Inc. 2600 Bridge Parkway Suite 201 Redwood City, California 94065 USA -Tom Donahoe
-Paul Keane
|
Version 3.0.1 |
Intel Xeon E5-2620 w/ RHEL 6.3 64bit; Sun UltraSparc T1 w/ Solaris 10 64bit; Intel Xeon E5-2620 w/ Microsoft Windows 2012 64bit | 2/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Axway Validation Authority Suite - a collection of products that provide flexible and robust OCSP/SCVP certificate validation solution for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions." |
2662 | Hewlett Packard Enterprise 14231 Tandem Boulevard Austin, TX 78728 USA -Paul Tucker
-Freddy A. Mercado
|
Version 3.8.0 (Firmware) |
Intel Jasper Forest Quad-core; Broadcom XLR | 2/27/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint IPS Platform operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. The IPS provides cryptographic services to protect the management of the device." 04/17/15: Updated implementation information; |
2661 | Draeger Medical Systems, Inc. 6 Tech Drive Andover, MA 01810 USA -Michael Robinson
|
Version VG2 (Firmware) Part # MS32018 |
N/A | 2/27/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Algorithm routines implemented in the DRAEGER WCM9113 802.11ABGN VG2" 03/26/15: Updated implementation information; |
2660 | Samsung Electronics Co., Ltd. 275-18, Samsung 1-ro Hwaseong-si, Gyeonggi-do 445-701 Korea -Jisoo Kim
|
Version REX_SHA256_V1.0 (Firmware) |
N/A | 2/27/2015 |
SHA-256 
(BYTE-only) "SM/PM163x Series is high-performace Self-Encrypting SSD supporting SAS 12G interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for data encryption, ECDSA P-224 for FW authentication, and CTR_DRBG for key generation." 03/06/15: Updated implementation information; |
2659 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 1.0.1 |
Intel Xeon QuadCore w/ CentOS 6.4 on VMware ESXi 5.1.0 | 2/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Accellion Kiteworks Cryptographic Module is a key component of Accellion''s Kiteworks product that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use." |
2658 | Cobham Tactical Communications & Surveillance (Cobham TCS) The Cobham Centre - Solent Fusion 2, 1100 Parkway Solent Business Park Whiteley, Hampshire PO15 7AB United Kingdom -Graham Foord
-Neil McSparron
|
Version 1.0 (Firmware) |
Freescale ColdFire Microprocessor (MCF54453) | 2/20/2015 |
SHA-256 
(BYTE-only) "The AES Encryption module is used in Cobham''s products to provide secure AES Encryption such as in the NETNode IP Mesh radio to protect data transmitted over the NETNode high capacity ad-hoc multi-radio mesh network." |
2657 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Scott Sinsel
|
Version 4.6.1 (Firmware) |
Intel(R) Xeon(R) CPU E5540 @ 2.53GHz | 2/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Network Intrusion Prevention System (IPS) automatically blocks malicious attacks while preserving network bandwidth and availability." |
2656 | N/A | N/A | N/A | 2/20/2015 | N/A |
2655 | N/A | N/A | N/A | 2/20/2015 | N/A |
2654 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R2416 (Firmware) |
Broadcom XLP108AQ 1GHz | 2/20/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2653 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R2416-Kernel (Firmware) |
Broadcom XLP108AQ 1GHz | 2/20/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2652 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tejinder Singh
-Phanikumar Kancharla
|
Version 1.0.0 (Firmware) |
Cavium Octeon Family, CN61XX | 2/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This module implements listed algorithms OpenSSL and Octeon 61XX processor." |
2651 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Scott Sinsel
|
Version 4.6.1 (Firmware) |
Intel(R) Xeon(R) CPU E5540 @ 2.53GHz | 2/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Network Intrusion Prevention System (IPS) automatically blocks malicious attacks while preserving network bandwidth and availability." |
2650 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA -Scott Sinsel
|
Version 3.1.1 |
Intel Xeon E5540 @ 2.53GHz w/ winW (64-bit) | 2/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SiteProtector security feature using IBM Global Security Kit (GSKit)." |
2649 | Micron Technology 570 Alder Drive Milpitas, CA 95035 USA -Dale McNamara
|
Version 36856 (Firmware) |
Marvell 88SS91XX (ARMv5) | 2/13/2015 |
SHA-256 
(BYTE-only) "AES Component implements AES key size of 256 bits used for encrypting CSP’s. SHA256 used for check character generation. RSA used for F/W package signature verification. CTR_DRBG is used for AES KEY generation." |
2648 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 2.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 2/13/2015 |
SHA-1     
(BYTE-only) "OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. This test covers the SSSE3 assmbler implementation of AES and SHA-1 on Intel x86 64bit HP hardware." |
2647 | Watchdata Technologies Pte Ltd 7F QiMing International Building Wangjing Lize Middle Park No.101 Beijing, Chaoyang District 100102 China -Fan Nannan
-Wang Xuelin
|
Part # AS518 and PCB K023314A |
N/A | 2/13/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The WatchKey ProX USB token provides digital signature generation and verification for online authentication of online transactions and data encryption/decryption to online service users" 05/22/15: Updated vendor information; |
2646 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 2.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 2/13/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. This test covers the generic assembler implementation of AES and SHA on Intel x86 64bit HP hardware." |
2645 | SUSE, LLC 10 Canal Park, Suite 200 Cambridge, MA 02141 USA -Thomas Biege
-Michael Hager
|
Version 2.0 |
Intel x86-64 w/ SUSE Linux Enterprise Server 12 | 2/13/2015 |
SHA-1     
(BYTE-only) "OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. This test covers the AES-NI implementation of AES and AVX+SSSE3 assembler implementation of SHA-1 on Intel x86 64bit HP hardware." |
2644 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Version 1.0 |
ARMv7 w/ Customized Linux 3.0 | 2/13/2015 |
SHA-1     
(BYTE-only) "The RICOH Cryptographic Library (Java) provides the cryptographic functionality found in RICOH MFP. It implements support for RSA Digital Signature verification and SHA." |
2643 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Version 1.0 |
ARMv7 w/ Customized Linux 3.0 | 2/13/2015 |
SHA-1     
(BYTE-only) "The RICOH Cryptographic Library (C) provides the cryptographic functionality found in RICOH MFP. It implements support for RSA Digital Signature verification." |
2642 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Nick Goble
|
Version 1.0.2 |
Intel X3450 Quad Core w/ Linux x86_64; Intel E5620 Quad Core w/ Linux x86_64; Intel E5645 Hex Core w/ Linux x86_64 | 2/6/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Blue Coat SSL Visibility Appliance decrypts multiple streams of SSL content to provide IDS/IPS, logging, forensics, and data loss prevention. This preserves complete network traffic histories necessary for compliance/threat analysis and enables SSL inspection capabilities that close the security loophole created by SSL." |
2641 | AKCode Inc. 13130 Roundup Avenue San Diego, CA 92129 USA -Dr. Lynn Spraggs
-Bill Landreth
|
Version 1.0.2 |
Intel Core i5 w/ Microsoft Windows 7 x64 | 2/6/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The UIS Anonymous Key Technology Skyhook Security Suite is a Java software package with an API interface for performing cryptographic operations and at the same time for performing personal authentication. The module is based on symmetric AES encryption and the UIS AKT methodology." |
2640 | AKCode Inc. 13130 Roundup Avenue San Diego, CA 92129 USA -Dr. Lynn Spraggs
-Bill Landreth
|
Version 1.0.2 |
Intel Core i5 w/ Microsoft Windows 7 x64 | 2/6/2015 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The AKCode Anonymous Key Technology Skyhook Security Suite is a software package with an API interface for performing cryptographic operations and at the same time for performing personal authentication. The module is based on symmetric AES encryption and the AKCode AKT methodology." 02/23/15: Updated vendor and Implementation informaiton; |
2639 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 4.8.12 (Firmware) |
Intel® Pentium Dual-Core | 2/6/2015 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
2638 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 7.4 (Firmware) |
Intel® Pentium Dual-Core | 2/6/2015 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
2637 | Websense, Inc. 10240 Sorrento Valley Road San Diego, CA 92121 USA |
Version 2.0 |
Intel Xeon E5-2400 w/ Microsoft Windows Server 2012 | 1/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Websense Java Crypto Module provides cryptographic functions for a variety of security solutions from Websense." |
2636 | KONA I Co., Ltd 8F EXCON Venture-Tower, 3, Eunhaeng-Ro, Yeongdeungpo-Gu Seoul, n/a 150-872 Republic of Korea -Irene Namkung
-Sungmin Ahn
|
Version 2.0 (Firmware) |
Infineon SLE97CNFX1M00PE A22 | 1/30/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Secure Hash Standard compliant one-way (hash) algorithms; SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. HMAC supports generation and verification with SHA-1, SHA-256, SHA-384 and SHA-512." |
2635 | j-Metrics No.630, Guangfu S. Rd., Da'an Dist., Taipei City 10695, Taiwan (R.O.C. Taipei, n/a 10695 Taiwan, ROC -Ming-Che Chen
-Sheng-Hung Wu
|
Version 1.0 |
ARM Cortex-A7 4 core w/ Android 4.4.2+ with kernel 3.4+. | 1/23/2015 |
SHA-1     
(BIT) SHA-224  (BIT) SHA-256  (BIT) SHA-384  (BIT) SHA-512  (BIT) Bit only "JMetrics Cryptographic Library is designed to help protect the data as it is transformed between our fingerprint sensor and security applications, such as Mobile Payment or storage encryption." |
2634 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Julie Ritter
|
Version 1.0 (Firmware) |
Freescale MPC8347 Processor; Freescale MPC8535 Processor | 1/23/2015 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP BladeSystem is a rack-mount enterprise-class computing infrastructure designed to maximize power while minimizing costs, saving up to 56% of the total cost of ownership compared to traditional infrastructures." |
2633 | Pure Storage, Inc. 650 Castro Street Suite #400 Mountain View, CA 94041 USA -Marco Sanvido
-Ethan Miller
|
Version 1.0.0 |
Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4 | 1/23/2015 |
SHA-256 
(BYTE-only) "Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." |
2632 | Palo Alto Networks 4401 Great America Parkway Santa Clara, California 95054 USA -Richard Bishop
-Jake Bajic
|
Version 6.1 (Firmware) |
Intel Multi Core Xeon | 1/16/2015 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks Crypto Module provides the cryptographic functionality for the Panorama M-100." 03/04/15: Updated implementation information; |
2631 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4.3-FIPS (Firmware) |
Broadcom BCM53014 | 12/31/2014 |
SHA-1     
(BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2630 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4.3-FIPS (Firmware) |
Broadcom BCM53014 | 12/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2629 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4.3-FIPS (Firmware) |
Broadcom BCM53014 | 12/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2628 | Redpine Signals, Inc. 2107 North First Street Suite #680 San Jose, CA 95131-2019 USA -Mallik Reddy
|
Version RSICryptoLib_1_0 (Firmware) Part # RS9113 |
N/A | 12/24/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Algorithm routines implemented in RSICryptoLib." 03/25/15: Updated implementation information; |
2627 | Samsung Electronics Co., Ltd. 416, Maetan 3-Dong Youngton Gu Suwon, Gyeonggi 152-848 South Korea -Abraham Joseph Kang
-Bumhan Kim
|
Version 1.0 |
Qualcomm MSM8974 w/ QSEE 2.0 | 12/24/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit." |
2626 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Daniel Hayes
-Alan Kaye
|
Version 5.2.1 (Firmware) |
Intel Celeron; Intel Xeon E5 | 12/24/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiAnalyzer SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2625 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Daniel Hayes
-Alan Kaye
|
Version 5.2.1 (Firmware) |
Intel Xeon E3; Intel Xeon E5 | 12/24/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiManager SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2624 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Daniel Hayes
|
Version 5.0.10 (Firmware) |
ARM v5 Compatible; Intel Atom; Intel Celeron; Intel i3-540 Dual Core; Intel i5-750 Quad Core; Intel Xeon | 12/24/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2623 | Cobham Tactical Communications & Surveillance (Cobham TCS) The Cobham Centre - Solent Fusion 2, 1100 Parkway Solent Business Park Whiteley, Hampshire PO15 7AB United Kingdom -Graham Foord
-Neil McSparron
|
Version 5.4 (Firmware) |
Freescale ColdFire Microprocessor (MCF54453) | 12/19/2014 |
SHA-256 
(BYTE-only) "Cobham’s NETNode AES Encryption module is used in the Cobham NETNode IP Mesh radio products to provide secure AES Encryption over the NETNode high capacity ad-hoc multi-radio mesh network." |
2622 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Daniel Hayes
|
Version 5.0.10 (Firmware) |
ARM v5 Compatible; Intel Atom; Intel Celeron; Intel i3-540 Dual Core; Intel i5-750 Quad Core; Intel Xeon | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2621 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Daniel Hayes
|
Part # CP8 |
N/A | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiASIC CP8 Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2620 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Daniel Hayes
|
Part # CP7 |
N/A | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiASIC CP7 Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2619 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Daniel Hayes
|
Part # CP6 |
N/A | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiASIC CP6 Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2618 | Barracuda Networks 3175 Winchester Road Campbell, CA 95008 USA -Andrea Cannon
|
Version 1.0.1.8 |
Intel Xeon, Intel Xeon with AES-NI, AMD Opteron, AMD Opteron with AES-NI w/ Barracuda OS v2.3.4 | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Barracuda Cryptographic Software Module is a cryptographic software library that provides fundamental cryptographic functions for applications in Barracuda security products that use Barracuda OS v2.3.4 and require FIPS 140-2 approved cryptographic functions." |
2617 | Qualcomm Technologies, Inc. 5775 Morehouse Dr San Diego, CA 92121 USA -Lu Xiao
|
Part # Snapdragon 810 |
N/A | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This cryptographic module implements block ciphers including AES and Triple DES in multiple modes, hash algorithms including SHA-1 and SHA-256, and Message Authentication Codes including HMAC and CMAC." |
2616 | Samsung Electronics Co., Ltd. 416, Maetan 3-Dong Youngton Gu Suwon, Gyeonggi 152-848 South Korea -Abraham Joseph Kang
-Bumhan Kim
|
Version 1.0 |
Samsung Electronics Exynos 5422 w/ MOBICORE Tbase 300 | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit." 12/23/14: Updated implementation information; |
2615 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Marion Mora
|
Version 9.5 |
Intel Pentium 4 w/ Microsoft Windows 2008 R2 (64-bit) | 12/19/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for the Deep Security Manager centralized management component used to configure security policy and deploy protection to enforcement components." |
2614 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA -Todd Ouska
-Larry Stefonic
|
Version 3.6.0 |
Intel Core i7 w/ Linux 3.13 64-bit | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency." 10/20/15: Updated implementation information; |
2613 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 0.6 (Firmware) |
Intel Xeon E5 | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2612 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 2.0.5 (Firmware) |
Intel Xeon E5 | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2611 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 0.6 (Firmware) |
Broadcom XLR | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2610 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 2.0.5 (Firmware) |
Broadcom XLR | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic services for the McAfee NSP Intrusion Prevention appliances" |
2609 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Nick Goble
|
Version 1.0.1 |
Intel X3450 Quad Core w/ Linux x86_64; Intel E5620 Quad Core w/ Linux x86_64; Intel E5645 Hex Core w/ Linux x86_64 | 12/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Blue Coat SSL Visibility Appliance decrypts multiple streams of SSL content to provide IDS/IPS, logging, forensics, and data loss prevention. This preserves complete network traffic histories necessary for compliance/threat analysis and enables SSL inspection capabilities that close the security loophole created by SSL." |
2608 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Ann-Marie Rubin
|
Version 2.6.32-504.23.1 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel - this tests covers the generic C implementations of various ciphers on Intel x86 64 bit IBM hardware." 02/17/15: Updated implementation information; |
2607 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Ann-Marie Rubin
|
Version 2.6.32-504.23.1 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel - this tests covers the generic C implementations of various ciphers on Intel x86 64 bit HP hardware." 02/13/15: Updated implementation information; |
2606 | Security First Corporation 29811 Santa Margarita Parkway Suite 600 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 4.7.0.29 |
Intel Core i5 on VMWare ESXi 4.1.0 w/ Microsoft Windows Server 2008 64-bit; Intel Core i7 on QEMU w/ Microsoft Windows Server 2012 64-bit; Intel Core i5 with AES-NI w/ Red Hat Enterprise Linux 6 64-bit; Intel Core i5 on QEMU w/ Suse Linux Enterprise Server 11 SP3 64-bit; IBM Power7 w/ AIX 7.1 64-bit; Intel Core i7 on QEMU with AES-NI, disabled w/ Windows 7 32-bit; Intel Core i7 on QEMU, AES-NI w/ Windows 7 32-bit; Intel Core i5 with AES-NI disabled w/ Windows 7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 64-bit; AMD A4-500 with AES-NI disabled w/ Windows 8 64-bit; AMD A4-500 with AES-NI w/ Windows 8 64-bit; Intel Core i5 without AES-NI w/ Red Hat Enterprise Linux 6 64-bit ;  Qualcomm Snapdragon 801 (ARMv7-A) w/ Android 4.4; Intel Core i5 without AES-NI w/Mac OS X 10.9 64-bit; Apple A7 (ARMv8) w/ iOS7 | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library." 02/18/15: Added new tested information; |
2605 | Red Cocoa II 8200 Cody Drive Suite G-2 Lincoln, NE 68512 USA -Andy Lenhart
-Mark Nispel
|
Version e8cf9b83d125d2e0247701b7f16e63dad48f1859 (Firmware) |
ST Micro STM32 F4 Series | 12/5/2014 |
SHA-256 
(BYTE-only) "SHA-256 Component implements the SHA-256 hash calculation over either a buffer all at once or a buffer in incremental sections." |
2604 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.6.2 |
Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi5.0 hypervisor | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2603 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.6.2 (Firmware) |
Celeron; Core i3; Xeon E5540 | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2602 | Sage Microelectronics Corp 910 Campisi Way Suite-2A Campbell, CA 95008 USA -Chris Tsu
-Larry Ko
|
Version 1.0 (Firmware) Part # S261, Rev A |
Sagemicro S261 (Hardware IC CHIP) | 12/5/2014 |
SHA-1     
(BIT) SHA-256  (BIT) SHA-512  (BIT) Bit only "SHA Library implements 1/256/512 bit SHA." 06/03/15: Added new tested information; |
2601 | Canon Inc. 30-2 Shimomaruko 3-chome Ohta-ku, Tokyo 146-8501 Japan -Yoichi Toyokura
|
Version V02L01R01 (Firmware) |
FR80E | 12/5/2014 |
SHA-256 
(BYTE-only) "The SHA256 Library provides cryptographic services for Canon MFP Security Chip." |
2600 | IBM Corporation 80 Bishop Dr., Unit B Fredericton, New Brunswick E3C 1B2 Canada -Peter Clark
-Chris LeMesurier
|
Version 1.0 |
Intel Xeon w/ RHEL 6 | 12/5/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The IBM Cryptographic Security Kernel is a multi-algorithm library providing general-purpose cryptographic services. The module provides a single, FIPS-Approved API for cryptography allowing for centralized FIPS mode status, logging, and reporting." |
2599 | INSIDE Secure Eerikinkatu 28 Helsinki, 00180 Finland -Serge Haumont
-Marko Nippula
|
Version 1.1 Part # n |
Intel Atom Z3740 with AES-NI w/ 64 bit library w/ Ubuntu Linux (kernel 3.13); Intel Atom Z2560 w/ 32 bit library w/ Android 4.2; Intel Atom Z3740 with AES-NI w/ 32 bit library w/ Ubuntu Linux (kernel 3.13); Intel Atom Z3740 without AES-NI w/ 64 bit library w/ Ubuntu Linux (kernel 3.13); ARMv6 w/ Raspbian Linux (kernel 3.10); ARMv7 w/ iOS 7.1; ARM64 with ARMv8 Crypto Extensions w/ iOS 7.1; iOS 7.1 w/ iOS 7.1; ARMv7-a w/ 11/21/2014
|
SHA-1     
(BYTE-only) |
SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. This compact and portable module provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to DAR, DRM, TLS, and VPN." |
2598 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version 1.0 |
Intel Xeon CPU X5560 @ 2.80GHz w/ Brocade Vyatta Series 3500 Network OS 3.2.1R1 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Built for Network Functions Virtualixation (NFV), Brocade Vyatta 5650 and 5630 vRouters are the first virtual routers capable of providing advance routing in software without sacrificing the reliability and performance of hardware networking solutions." 12/09/14: Updated implementation information; |
2597 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set compiled for 32bit word size." |
2596 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2595 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2594 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2593 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2592 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2591 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2590 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2589 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2588 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256." |
2587 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2586 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2585 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2584 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2583 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2582 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2581 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2580 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2579 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i5 w/ OSX 10.10 | 11/14/2014 |
SHA-256 
(BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256." |
2578 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Sandy Carielli
|
Version 3.0.0.23 |
ARM Cortex A7 Dual Core w/ Linaro Linux (kernel 3.10.33) | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
2577 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." 03/19/15: Updated implementation information; |
2576 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Langley Rock
-Laurie Mack
|
Version 5 (Firmware) |
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions." |
2575 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2574 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2573 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0.1 |
Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi 5.0 hypervisor | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances." |
2572 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0.1 (Firmware) |
Celeron; Core i3; Xeon E5540 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances." |
2571 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version FOS 7.4.0 (Firmware) |
CN6880 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules." |
2570 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." 03/19/15: Updated implementation information; |
2569 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2568 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2567 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2566 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2565 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2564 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2563 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2562 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2561 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6X w/ iOS 8 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2560 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6 w/ iOS 8 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2559 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5X w/ iOS 8 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2558 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5 w/ iOS 8 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2557 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories No.99, Dianyan Rd. Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 3.6 (Firmware) |
Renesas RS-4 series | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HiKey Cryptographic Library v3.6 supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, ECDSA(p-224/256/384), RSA 2048 encrypt/decrypt (including RSA-CRT), RSA signature generation /verification (including RSA-CRT) and APDU command/response encryption and/or MAC." |
2556 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 0.9.8r (Firmware) |
Intel® Pentium Dual-Core | 10/31/2014 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." 02/12/15: Updated implementation information; |
2555 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 7.2 (Firmware) |
Intel® Pentium Dual-Core | 10/31/2014 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
2554 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park, n/a 300 Taiwan, R.O.C. -Yossi Talmi
-Oren Tanami
|
Part # FB5C85D |
N/A | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Nuvoton TPM (Trusted Platform Module), a TCG 1.2 compliant security processor with embedded firmware" 11/17/14: Updated vendor and implementation information; |
2553 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.9 |
Apple A7 (ARMv8) with NEON w/ Apple iOS 7.1 64-bit; Apple A7 (ARMv8) without NEON w/ Apple iOS 7.1 64-bit ;  Arm920Tid (ARMv4) w/ TS-Linux 2.4 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 12/04/14: Added new tested information; |
2552 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 3.14.3-22 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size on IBM hardware." 11/18/14: Updated implementation information; |
2551 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 3.14.3-22 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size on IBM hardware." 11/18/14: Updated implementation information; |
2550 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 3.14.3-22 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size on HP hardware." 11/17/14: Updated implementation information; |
2549 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 3.14.3-22 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size on HP hardware." 11/17/14: Update implementation information; |
2548 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 7.2 (Firmware) |
Intel® Pentium Dual-Core | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
2547 | Red Hat, Inc. 100 East Davie Street Raleigh, NC 27601 USA |
Version 1.0.1e-30.el6_6.5 |
Intel x86 w/ Red Hat Enterprise Linux 6.6 | 11/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 03/19/15: Updated implementation information; |
2546 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2545 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2544 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2543 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2542 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2541 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2540 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2539 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2538 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2537 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel Xeon w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2536 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2535 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Intel i7 w/ OSX 10.10 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2534 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2533 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A8 w/ iOS 8 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2532 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6X w/ iOS 8 | 10/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2531 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Main Office
-Victor Wolff
|
Version 1.2.2 (Firmware) |
Intel® Xeon | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." |
2530 | Certicom Corp. 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada -Certicom Support
-Certicom Sales
|
Version 6.0.2.1 |
Intel Core i7-2720QM w/ AES-NI w/ Windows 7 Enterprise 64-bit; ARMv7 w/ Windows Phone 8.0; ARMv7 w/ Android 4.4.2; Intel Atom CPU Z2460 w/ Android 4.0.4; ARMv7 w/ iOS version 6.1.4 ;  ARMv8 w/ Android 5.0.1; ARMv7S w/ iOS 6.1.4; ARMv8 w/ iOS 8.0; Intel Xeon with AES-NI w/ Windows 7; Intel Xeon E5620 with AES-NI w/ CentOS Linux Release 7.1 64-bit; Intel Core i7-3615QM w/ Mac OS X Yosemite 10.10.4 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and IPSec and SSL modules." 04/13/15: Updated vendor and implementation information; |
2529 | SPYRUS Inc. 1860 Hartog Dr San Jose, Ca 95131-2203 USA -William Sandberg-Maitland
|
Version 3.0 (Firmware) Part # 742100004F |
SPYCOS 3.0 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SPYCOS 3.0 is a hardware cryptographic module that enables security critical capabilities such as user authentication, message privacy, integrity and secure storage in rugged, tamper-evident QFN and microSD form factors. The SPYCOS 3.0 Module communicates with a host computer via the standard USB interface." 12/24/14: Updated implementation information; |
2528 | Analog Devices, Inc. One Technology Way Norwood, MA 02062 USA |
Part # ADSP-BF706 |
N/A | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "The Analog Devices Security Packet Engine provides uniform cryptographic capabilities for the ADSP-BF70x Blackfin processor family." |
2527 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2526 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A7 w/ iOS 8 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2525 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A6 w/ iOS 8 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2524 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5X w/ iOS 8 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2523 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 5.0 |
Apple A5 w/ iOS 8 | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2522 | Broadcom Corporation 5300 California Avenue Irvine, CA 92617 USA -Mark Litvack
|
Part # XLP200 series Revision B0 |
N/A | 10/16/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XLP200 series (XLP104, XLP108, XLP204, XLP208) of multi-core processors can deliver an unprecedented 160Gps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro, edge and core network applications." |
2521 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
|
Version 149 |
Qualcomm Snapdragon 800 w/ Android 4.4.2 | 9/30/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services available for Android used by LG devices to provide secured services to Java applications via the Bouncy Castle Java Cryptography Extension provider." |
2520 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
|
Version 3.4.0 Saber-tooth Squirl |
Qualcomm Snapdragon 800 w/ Android 4.4.2 | 9/30/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services." |
2519 | LG Electronics, Inc. 20 Yoido-dong Youngdungpo-gu Seoul, n/a 152-721 Republic of Korea -Joonwoong Kim
|
Version 1.0.1e |
Qualcomm Snapdragon 800 w/ Android 4.4.2 | 9/30/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library." |
2518 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.5 |
ARMv7 w/ Android KitKat 4.4.4 | 9/30/2014 |
SHA-1     
(BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This test covers the AES and SHA1 assembler implementations." |
2517 | EROAD, Inc. Level 3 260 Oteha Valley Road Albany, North Shore 0632 Auckland, * * New Zealand -Bruce Wilson
|
Version 1.0 (Firmware) Part # MK70FN1M0VMJ12 |
MK70FN1M0VMJ12 | 9/26/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The EROAD Cryptographic Module is the heart of EROAD''s advanced GNSS based transport technology. It is a secure, high performance, cryptographic processing engine and has been designed to meet FIPS-140-2 at Security Level 3. It is used within the EROAD product suite to provide trusted cryptographic security services." 09/30/14: Added new tested information; |
2516 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Marion Mora
|
Version 9.5 |
Intel Core 2 Duo w/ VMware ESX 5.1 | 9/26/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for Deep Security Agents and Appliances deployed directly on protected computers." |
2515 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Marion Mora
|
Version 9.5 |
Intel Core 2 Duo w/ VMware ESX 5.1 | 9/26/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for Deep Security Agents and Appliances deployed directly on protected computers." |
2514 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.5 |
ARMv7 w/ Android KitKat 4.4.4 | 9/30/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2513 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Part # 15-14497-02(NDS_ACT2_V1) |
N/A | 9/26/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ACT-2Lite is an ASSP which is based on a smart card hardware platform with custom ROM code provided by Cisco." |
2512 | Zebra Technologies Corporation 475 Half Day Road, Suite 500 Lincolnshire, IL 60069 USA -Erv Comer
-Tom McKinney
|
Version X_2.02.0.0.4 |
TI OMAP4 w/ Windows Mobile 6.5; TI OMAP4 w/ Windows CE7.0; Marvell PXA320 w/ Windows Mobile 6.5; Marvel PXA320 w/ Windows CE6.0; Freescale i.MX35 w/ Windows CE6.0 | 9/26/2014 |
SHA-256 
(BYTE-only) "Firmware loader library implements SHA256 and HMAC-SHA256." 02/12/15: Updated implementatio information; |
2511 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R2406-Kernel (Firmware) |
Freescale P2020, 1.2GHz, PowerPC | 9/19/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2510 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R1005 (Firmware) |
Broadcom XLP316, 1.2GHz, MIPS | 9/19/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2509 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1R1005-Kernel (Firmware) |
Broadcom XLP316, 1.2GHz, MIPS | 9/19/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2508 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R7328-Kernel (Firmware) |
Freescale MPC8548, 667MHz, PowerPC | 9/19/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2507 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1R2111-Kernel (Firmware) |
Broadcom XLP316, 1.2GHz, MIPS | 9/19/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2506 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version ComwareV7.1-R2311-Kernel (Firmware) |
RMI(Netlogic) XLS408, 1.2GHz, MIPS | 9/19/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2505 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-3.0 (Firmware) |
Dual-core ARM Cortex A9 1Ghz | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This Brocade cryptographic library is used in Brocade FastIron based switches to implement the cryptographic related modules." 08/04/15: Updated implementation information; |
2504 | Hitachi, Ltd. 322-2 Nakazato Odawara-shi, Kanagawa-ken 250-0872 Japan -Hitachi, Ltd. Storage Systems Development Operation
|
Part # 2.0 |
N/A | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "n/a" |
2503 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version 1.0 |
Intel Xeon Processor E5-2680 v2 (25 M Cache, 2.80 GHz) w/ Brocade Vyatta Network OS 3.2.1R1 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Built for Network Functions Virtualixation (NFV), Brocade Vyatta 5650 and 5630 vRouters are the first virtual routers capable of providing advance routing in software without sacrificing the reliability and performance of hardware networking solutions." 12/09/14: Updated implementation information; |
2502 | ChaseSun Information Security Technology Development (Bejing)., Ltd. North Building 13 Xindacheng Plaza 197# Guangzhou Road Yuexiu District, Guangzhou 510075 China -Peng Sun
|
Version 1.0.0 (Firmware) Part # NA |
Mentor ModelSim SE 6.5b (Simulator) | 9/12/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "CS100 Module FPGA Library implements the cryptographic algorithms such as AES, HMAC and SHA. The Library provides cryptographic functionality to CS100 module." |
2501 | ChaseSun Information Security Technology Development (Bejing)., Ltd. North Building 13 Xindacheng Plaza 197# Guangzhou Road Yuexiu District, Guangzhou 510075 China -Peng Sun
|
Version 1.0.0 (Firmware) |
Freescale MCIMX53 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "CS100 Module Crypto Library implements the cryptographic algorithms such as AES, HMAC, SHA and RNG. The library provides cryptogrpahic finctionality to CS100 module." |
2500 | Doremi Labs 1020 Chestnut Street Burbank, CA 91506 USA -Jean-Philippe Viollet
-Camille Rizko
|
Version 1.1 (Firmware) Part # PPC405EX-SSD600T |
Power PC | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "An Implementation of SHA-1 and SHA-256 algorithms used inside Doremi Labs'' Media Blocks" |
2499 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 6.1 |
Intel Xeon w/ McAfee Linux 2.2.3 running on VMware ESXi 5.0 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2498 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 6.1 |
Intel Celeron w/ McAfee Linux 2.2.3; Intel Xeon w/ McAfee Linux 2.2.3 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2497 | Dell, Inc 5450 Great America Parkway Santa Clara, CA 95054 US -Jan Provan
|
Version 2.1 |
Intel Centerton w/ Dell Networking Operating System E9.6.0.0; FreeScale PowerPC e500 w/ Dell Networking Operating System E9.6.0.0; Intel Xeon w/ Dell Networking Operating System E9.6.0.0; Broadcom XLP w/ Dell Networking Operating System E9.6.0.0 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Dell OpenSSL Cryptographic Library v2.1 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features." 12/16/14: Updated vendor information; |
2496 | N/A | N/A | N/A | 9/12/2014 | N/A |
2495 | Huawei (Dongguan) Co., Ltd. B2-5 of Nanfang Factory No.2 of Xincheng Rd Songshan Lake Science & Technology Industrial Zone Dongguan, Guangdong 523808 China -Mr. Hongtailiang
-Mr. Blue Lee
|
Version V1.0 |
Huawei P7 Mobile Phone w/ Android 4.4.2 | 9/12/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The module provides the key management functions of secure applications. It provides a key generating by RNG and AES algorithm to encrypt the DEK, and the symmetric key for AES is generated by PBKDF which based on HMAC and SHA algorithm." |
2494 | Samsung Electronics Co.,Ltd. Samsung 1-ro Hwaseong-si, Gyeonggi-do 275-18 Korea -Jisoo Kim
|
Part # HMAC_SHA256 V1.0 |
N/A | 9/12/2014 |
SHA-256 
(BYTE-only) "Secure UFS is a high-performance embedded storage that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation." 02/12/15: Updated implementation information; |
2493 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA -Patrick Scully
|
Version 1.10 (Firmware) |
Xilinx XC7Z045 | 8/29/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Ciena 6500 Packet-Optical Platform 4x10G Encryption OTR offers an integrated transport encryption solution providing a protocol-agnostic wirespeed encryption service for use in small to large enterprises or datacenters and also offered through service providers as a differentiated managed service." |
2492 | Kaspersky Lab UK Ltd. 1st Floor, 2 Kingdom Street Paddington London, W2 6BD United Kingdom -Oleg Andrianov
|
Version 2.0 |
Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz w/ Windows 7 Enterprise 64-bit; Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz w/ Windows 8.1 Enterprise 64-bit; Intel(R) Core(TM)2 Duo P9600 @ 2.53GHz w/ Kaspersky Preboot OS with UEFI | 8/29/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Kaspersky Cryptographic Library is a software library that provides cryptographic services for various Kaspersky Lab applications." |
2491 | Kanguru Solutions 1360 Main Street Millis, MA 02054 USA -Nate Cote
|
Version 2.10.10 (Firmware) Part # KDF3K-CM |
v2.10.10 | 8/28/2014 |
SHA-256 
(BYTE-only) "The Kanguru Defender 3000 and Kanguru Defender Elite300 are 256-bit AES hardware encrypted USB flash drives. They are used to securely store sensitive data on the device or run secure applications from the drive. The Kanguru Defender line of products is remotely manageable through the Kanguru Remote Management Console(KRMC)." |
2490 | Exar Corporation 48720 Kato Road Fremont, CA 94538 USA -Larry Hu
-Bin Wu
|
Part # XR9240 |
N/A | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XR92xx provides hardware acceleration of compression, encryption and authentication algorithms including gzip/zlib/Deflate, LZS/eLZS, AES, 3DES, RC4, SHA, HMAC, GMAC and public key algorithms such as DSA, DH, RSA, ECDSA, ECDH and is designed to optimize SSL/IPsec/SRTP packet processing." |
2489 | Kaspersky Lab UK Ltd. 1st Floor, 2 Kingdom Street Paddington London, W2 6BD United Kingdom -Oleg Andrianov
|
Version 2.0 |
Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz w/ Windows 7 Enterprise 64-bit; Intel(R) Core(TM) i7-3770S CPU @ 3.10GHz w/ Windows 8.1 Enterprise 64-bit | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Kaspersky Cryptographic Library is a software library that provides cryptographic services for various Kaspersky Lab applications." |
2488 | Kaspersky Lab UK Ltd. 1st Floor, 2 Kingdom Street Paddington London, W2 6BD United Kingdom -Oleg Andrianov
|
Version 2.0 |
Intel(R) Core(TM)2 Duo P9600 @ 2.53GHz w/ Windows 7 Professional 32-bit | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Kaspersky Cryptographic Library is a software library that provides cryptographic services for various Kaspersky Lab applications." |
2487 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Atom Processor D525 w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2486 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Celeron Processor 725c with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2485 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Core i3-2115c with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2484 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-1650v2 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2483 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-2660 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2482 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-2680 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Library is a software module that provides cryptographic services required by the McAfee NGFW product." |
2481 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V7.1-R2311 (Firmware) |
RMI(Netlogic) XLS408, 1.2GHz, MIPS | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2480 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V7.1-R2111 (Firmware) |
Broadcom XLP316, 1.2GHz, MIPS | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2479 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V7.1-R2406 (Firmware) |
Freescale P2020, 1.2GHz, PowerPC | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2478 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Comware V7.1-R7328 (Firmware) |
Freescale MPC8548, 1.0GHz, PowerPC | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2477 | Oracle Corporation 4220 Network Circle Santa Clara, CA 95054 USA -Joshua Brickman
|
Version 1.0f (Firmware) Part # SLE78 M7892B11 |
Infineon SLE78 M7892B11 smart card microcontroller | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TOE is a part of Java Card Platform (JCP) composed of a Smart Card Platform (SCP) and embedded software. Validation covers straight RSA as well as RSA in CRT implementation." 04/15/15: Updated implementation information; |
2476 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2.109 (Firmware) |
P1020, 880MHz, PowerPC; XLP432, 1.4GHz, MIPS; XLR732, 950Mhz, MIPS; XLS208, 750Mhz, MIPS | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2475 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.4.1.3 |
ARM 7 w/ Tizen 2.2.1 | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2474 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.4.1.3 |
ARM 7 w/ Tizen 2.2.1 | 8/28/2014 |
SHA-1     
(BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This tests covers the AES and SHA1 assembly implementations." |
2473 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version NOS 5.0.0 (Firmware) |
E 500 mc | 8/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Brocade cryptographic library is used in Brocade NOS based switches to implement the cryptographic related modules." |
2472 | Microsemi Corporation One Enterprise Aliso Viejo, CA 92656 USA -Richard Newell
|
Version 1.1 (Firmware) |
Mentor Graphics Questa Simulator 10.1c | 8/11/2014 |
SHA-256 
(BIT) "The Microsemi SoC Cryptographic Module provides custom hardware/firmware acceleration of the standard cryptographic algorithms used in Microsemi FPGAs and SoC FPGAs like Igloo®2 and SmartFusion®2. They are used to securely configure the devices, and are also made available to the FPGA user via an internal bus interface for use in end applications." |
2471 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Mr. Xiao, Liquin
-Dr. Sun, Xiaobin
|
Version 1.0.0 (Firmware) |
Xilinx Kintex-7 FPGA | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Oristar IMB SHS Core-K1 is the firmware module for digital cinema system." |
2470 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Mr. Xiao, Liquin
-Dr. Sun, Xiaobin
|
Version 1.0.0 (Firmware) |
RENESAS SH-4A | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "OristarIMB SHS Core-S is the firmware module for digital cinema system." |
2469 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Mr. Xiao, Liquin
-Dr. Sun, Xiaobin
|
Version 1.0.0 (Firmware) |
Altera Cyclone III FPGA | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Oristar IMB SHS Core-C is the firmware module for digital cinema system." |
2468 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Mr. Xiao, Liquin
-Dr. Sun, Xiaobin
|
Version 1.0.0 (Firmware) |
Xilinx Kintex-7 FPGA | 8/11/2014 |
SHA-1     
(BYTE-only) "Oristar IMB SHS Core-K2 is the firmware module for digital cinema system." |
2467 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.1.4 (Firmware) |
Intel Xeon E5-2418L; Intel Xeon E5-2430; Intel Xeon E5-2658 | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Blue Coat Crypto Library v1.0 provides the necessary cryptographic services to a proprietary operating system (SGOS 6.5.2) developed specifically for use in Blue Coat''s ProxySG line of appliances." |
2466 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Part # XLP432, 1.4 GHz, MIPS; XLR732, 950Mhz, MIPS; XLS208, 750MHz, MIPS |
N/A | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Hardware accelerator is a CPU functional module that provides cryptographic functions within HP devices." |
2465 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.8 |
Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 10.0; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 10.0; Intel Xeon E5440 (x86) 32-bit without AES-NI w/ FreeBSD 8.4; Intel Xeon E3-1220 (x86) without AES-NI w/ VMware Horizon Workspace 2.1 under vSphere; Intel Xeon E3-1220 (x86) with AES-NI w/ VMware Horizon Workspace 2.1 under vSphere; Freescale i.MX25 (ARMv4) w/ QNX 6.5 | 8/11/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 09/22/14: Added new tested information; |
2464 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Part # Freescale P1021, 800Mhz; Cavium 6130, 1Ghz, MIPS; |
N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2463 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version Version 7.1.R0106 (Firmware) |
Freescale P1021, 800Mhz, PowerPC; Cavium 6130, 1Ghz, MIPS; Cavium 6635, 1.3 Ghz, MIPS; Cavium 6218, 1Ghz, MIPS; Cavium 6740, 1Ghz, MIPS; Cavium 6760, 1Ghz, MIPS; Cavium 6880, 1.2Ghz, MIPS | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2462 | Protegrity USA Inc. 5 High Ridge Park 2nd Fl. Stamford, Connecticut 06905 USA -Yigal Rozenberg
-Raul Ortega
|
Version 1.0 |
IBM zEC12 w/ IBM z/OS 2.1 | 7/31/2014 |
SHA-1     
(BYTE-only) "The Protegrity Cryptographic Module is a software module that provides FIPS validated cryptographic services for Protegrity Data Security products" |
2461 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.1.3 (Firmware) |
AMD64 Opteron (Istanbul); AMD64 Opteron (Shanghai); Intel Clarkdale; Intel Lynnfield; VIA NANO | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SGOS 6.5 Cryptographic Library provides the necessary cryptographic services to a proprietary operating system (SGOS 6.5) developed specifically for use on a series of hardware appliances that serve as Internet proxy and Wide Area Network (WAN) optimizer devices." |
2460 | Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 USA -Alan Kaye
|
Version 5.0 |
Intel Core 2 Duo w/ Windows 7 Enterprise ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FortiPS library provides the following services for the FortiClient 5.0: HMAC, SHA1, AES CBC, AES ECB and 3DES." |
2459 | Protegrity USA Inc. 5 High Ridge Park 2nd Fl. Stamford, Connecticut 06905 USA -Yigal Rozenberg
-Raul Ortega
|
Version 1.0 |
Intel 64 w/ SLES 11 ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) "The Protegrity Cryptographic Module is a software module that provides FIPS validated cryptographic services for Protegrity Data Security products" |
2458 | Protegrity USA Inc. 5 High Ridge Park 2nd Fl. Stamford, Connecticut 06905 USA -Yigal Rozenberg
-Raul Ortega
|
Version 1.0 |
Intel 64 w/ Windows 2008 ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) "The Protegrity Cryptographic Module is a software module that provides FIPS validated cryptographic services for Protegrity Data Security products" |
2457 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-2680 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2456 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-2660 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2455 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Xeon Processor E5-1650v2 with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2454 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Core i3-2115c with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2453 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Celeron Processor 725c with AES-NI w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2452 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Klaus Majewski
-Jorma Levomäki
|
Version 2.0 |
Intel Atom Processor D525 w/ GNU / Linux (Debian) 6.0 -based distribution ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee NGFW Cryptographic Kernel Module is a software module that provides cryptographic services required by the McAfee NGFW product." |
2451 | Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 USA -Alan Kaye
|
Version 5.0 |
Intel Core 2 Duo w/ Windows 7 Enterprise ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FCCrypt library provides the following services for the FortiClient 5.0: HMAC, SHA-1, SHA-256, AES CBC, AES ECB, 3DES, RSA and NIST 800-90A RBG." |
2450 | Oberthur Technologies 402 rue d’Estienne d’Orves Colombes, n/a 92700 France -GOYET Christophe
-BOUKYOUD Saïd
|
Version 06939.16 (Firmware) Part # 0F |
ID-One PIV-C on Cosmo V8 ;  N/A | 7/31/2014 |
SHA-384 
(BYTE-only) SHA-512  (BYTE-only) "ID-One Cosmo V8 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.1 and GlobalPlatform 2.2.1 chip which supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, as well as SHA-3 (The Keccak SHA-3 submission - Version 3.0 - January 14, 2011)" 08/07/14: Updated implementation information; |
2449 | Oberthur Technologies 402 rue d’Estienne d’Orves Colombes, n/a 92700 France -GOYET Christophe
-BOUKYOUD Saïd
|
Version 06939.16 (Firmware) |
ID-One PIV-C on Cosmo V8 ;  N/A | 7/31/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "ID-One Cosmo V8 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.1 and GlobalPlatform 2.2.1 chip which supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, as well as SHA-3 (The Keccak SHA-3 submission - Version 3.0 - January 14, 2011)" |
2448 | Beijing Huada Infosec Technology Co.,Ltd 4F,Tower B,Yandong Building No.2 Wanhong West Street Chaoyang District Beijing, Beijing 100015 P.R.China -Junmai Zhang
-Yanhua Liu
|
Version V1.0 (Firmware) |
IS8U256A with 8-bit ISC8051 embedded ;  N/A | 7/31/2014 |
SHA-256 
(BYTE-only) "ISRNG01 V1.0 Hardware Cryptographic Library provides core cryptographic functionality for Beijing Huada Infosec''s security IC providing a capability to develop complex and flexible security applications." |
2447 | Microsemi Corporation One Enterprise Aliso Viejo, CA 92656 USA -Richard Newell
|
Version 1.0 (Firmware) |
Mentor Graphics Questa Simulator 10.1c ;  N/A | 7/31/2014 |
SHA-256 
(BIT) "The Microsemi SoC Cryptographic Module provides custom hardware/firmware acceleration of the standard cryptographic algorithms used in Microsemi FPGAs and SoC FPGAs like Igloo®2 and SmartFusion®2. They are used to securely configure the devices, and are also made available to the FPGA user via an internal bus interface for use in end applications." |
2446 | Canon Inc. 30-2 Shimomaruko 3-chome Ohta-ku, Tokyo 146-8501 Japan -Yoichi Toyokura
|
Version 2.10 (Firmware) |
FR80E | 7/18/2014 |
SHA-256 
(BYTE-only) "Canon MFP Security Chip provides high-performance data encryption and decryption via SATA interface." |
2445 | Atmel Corporation 1150 E. Cheyenne Mountain Blvd Colorado Springs, CO 80906 USA -Jim Hallman
|
Version 0x1003 (Firmware) |
Cadence NC Verilog hardware simulator | 7/18/2014 |
SHA-256 
(BYTE-only) "Atmel CryptoAuthentication: Secure authentication and product validation device." |
2444 | Hewlett-Packard Development Company, L.P. 20555 State Highway 249 Houston, TX 77070 USA -Catherine Schwartz
-Jaycee Murlidar
|
Part # PM8064 |
N/A | 7/10/2014 |
SHA-256 
(BYTE-only) "HP Secure Encryption is a controller-based data encryption solution for HP ProLiant Gen8 or newer servers that protects data at rest on any bulk storage attached to the HP Smart Array controller. The solution comprises our 12G family of HP Smart Array controllers, the HP Physical Security Kit, and the HP Secure Encryption licensing." 06/01/15: Updated implementation information; |
2443 | Hewlett-Packard Development Company, L.P. 20555 State Highway 249 Houston, TX 77070 USA -Catherine Schwartz
-Jaycee Murlidar
|
Part # PM8062 |
N/A | 7/10/2014 |
SHA-256 
(BYTE-only) "HP Secure Encryption is a controller-based data encryption solution for HP ProLiant Gen8 or newer servers that protects data at rest on any bulk storage attached to the HP Smart Array controller. The solution comprises our 12G family of HP Smart Array controllers, the HP Physical Security Kit, and the HP Secure Encryption licensing." 06/01/15: Updated implementation information; |
2442 | Hewlett-Packard Development Company, L.P. 20555 State Highway 249 Houston, TX 77070 USA -Catherine Schwartz
-Jaycee Murlidar
|
Part # PM8061 |
N/A | 7/10/2014 |
SHA-256 
(BYTE-only) "HP Secure Encryption is a controller-based data encryption solution for HP ProLiant Gen8 or newer servers that protects data at rest on any bulk storage attached to the HP Smart Array controller. The solution comprises our 12G family of HP Smart Array controllers, the HP Physical Security Kit, and the HP Secure Encryption licensing." 06/01/15: Updated implementation information; |
2441 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 2.0 (Firmware) |
Atheros QCA9550; Freescale SC1018; Freescale SC1023 | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "IOS Common Cryptographic Module" 07/10/15: Updated implementation information; |
2440 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4 (Firmware) |
Broadcom XLP Series; Freescale QorIQ P10XX Series | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. The Broadcom XLP Series includes Broadcom XLP 204, XLP 208, XLP 316, XLP 408, XLP 416 and XLP 432 processors; the Freescale QorIQ P10XX Series includes P1010 and P1020 processors." 12/04/14: Updated implementation information; |
2439 | Palo Alto Networks 4401 Great America Parkway Santa Clara, California 95054 USA -Richard Bishop
-Jake Bajic
|
Version PAN-OS 6.0/Panorama 6.0 (Firmware) |
Cavium Octeon MIPS64; Intel Multi Core Xeon; Intel Celeron P4505; Intel Core I7 | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7050 firewalls and M100/Panorama. The firewalls provide network security by enabling enterprises to see/control applications, users, and content." |
2438 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version QuickSec-2.0-8.0 (Firmware) |
Cavium 56XX | 7/10/2014 |
SHA-1     
(BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture."" |
2437 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version Openssl-0.9.8g-8.0.0 (Firmware) |
Cavium 56XX | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cisco WLAN Controllers provide centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." 10/14/2014: Added KDF 800-135 IKEv1 KDF and SNMP KDF and updated implementation description. |
2436 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version FOS 7.3.0 (Firmware) |
PPC 440GPX and PPC 8548 | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Brocade Cryptographic Library is used in Brocade FOS based switches to implement the cryptographic related modules." |
2435 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris marks
|
Version FOS 7.3.0 (Firmware) |
E 500 mc | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules." |
2434 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP7 |
N/A | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP7 Cryptographic Library 5.0 GA Patch 7" |
2433 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Ajit Kumar Singh Parihar
|
Version Junos 13.2X51-D20 (Firmware) |
Marvell Feroceon 88FR131; Freescale PowerPC e500v2 Core; Junos 13.2X51-D20; Broadcom XLR XLS 400 Series (DCF); Intel Xeon E3-1200 Family (Sandy Bridge) | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2432 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Ajit Kumar Singh Parihar
|
Version Junos 13.2X50-D19 (Firmware) |
Marvell Feroceon 88FR571; Freescale PowerPC e500v2 Core | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2431 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Ajit Kumar Singh Parihar
|
Version Junos 13.2X51-D20 (Firmware) |
Marvell Feroceon 88FR131; Freescale PowerPC e500v2 Core; Freescale PowerPC e500mc Core; Broadcom XLR XLS 400 Series (DCF); Intel Xeon E3-1200 Family (Sandy Bridge) | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2430 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Ajit Kumar Singh Parihar
|
Version Junos 13.2X50-D19 (Firmware) |
Marvell Feroceon 88FR571; Freescale PowerPC e500v2 Core | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2429 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # Cavium 5646 |
N/A | 7/10/2014 |
SHA-1     
(BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture."" |
2428 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Version 1.2 (Firmware) |
Freescale P1010 | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Firmware algorithm implementations for the ONS encryption card." |
2427 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Version 1.2 (Firmware) |
Freescale MPC8568E | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Firmware algorithm implementations for the ONS controller cards." |
2426 | Becrypt Ltd. 90 Long Acre Covent Garden London, England WC2E 9RA United Kingdom -Mark Wilce
-Nigel Lee
|
Version 3.0 |
Fujitsu LifeBook S7020 laptop with Intel Pentium M 740 processor w/ MS-DOS 6.22 | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt''s security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments." |
2425 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4 (Firmware) |
Broadcom XLP Series; Freescale QorIQ P10XX Series | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. The Broadcom XLP Series includes Broadcom XLP 204, XLP 208, XLP 316, XLP 408, XLP 416 and XLP 432 processors; the Freescale QorIQ P10XX Series includes P1010 and P1020 processors." 12/04/14: Updated implementation information; |
2424 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
-Steve Weingart
|
Version ArubaOS 6.4 (Firmware) |
Broadcom XLP Series; Freescale QorIQ P10XX Series | 7/10/2014 |
SHA-1     
(BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. The Broadcom XLP Series includes Broadcom XLP 204, XLP 208, XLP 316, XLP 408, XLP 416 and XLP 432 processors; the Freescale QorIQ P10XX Series includes P1010 and P1020 processors." 12/04/14: Updated implementation information; |
2423 | Becrypt Ltd. 90 Long Acre Covent Garden London, England WC2E 9RA United Kingdom -Mark Wilce
-Nigel Lee
|
Version 3.0 |
Google Nexus 7 (2012) with NVidia Tegra 3 ARM v6 w/ Android v4.2.2; Dell Vostro 1500 with Intel Centrino Duo 64-bit processor w/ Ubuntu Linux 12.04 LTS; Dell D630 with Intel Centrino Duo 32-bit processor w/ Ubuntu Linux 12.04 LTS; Dell Venue 11 Pro (7130) with Intel Core i5-4300Y 64-bit AES-NI processor w/ Microsoft Windows 8.1 Professional; Dell Vostro 1500 with Intel Centrino Duo 64-bit processor w/ Microsoft Windows 7 Enterprise Edition; Dell D630 with Intel Centrino Duo 32-bit processor w/ Microsoft Windows 7 Ultimate Edition | 7/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt''s security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments." |
2422 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Helen Li
|
Version 1.0 (Firmware) |
Freescale MCIMX515DJM8C | 6/30/2014 |
SHA-256 
(BYTE-only) "Oristar''s Integrated Media Block (IMB) product with its model number CHN-II supports 2K/4K Jpeg2000 image decoding for theatrical playback in Digital Cinemas." |
2421 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Helen Li
|
Version 1.0 (Firmware) |
Xilinx Virtex-6 FPGA XC6VLX130T | 6/30/2014 |
SHA-1     
(BYTE-only) "Oristar''s Integrated Media Block (IMB) product with its model number CHN-II supports 2K/4K Jpeg2000 image decoding for theatrical playback in Digital Cinemas." |
2420 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # 1.0 |
N/A | 6/30/2014 |
SHA-1     
(BYTE-only) "Cisco''s new Unified Access Data Plane (UADP) application-specific integrated circuit (ASIC) powers the switch and enables uniform wired-wireless policy enforcement, application visibility, flexibility and application optimization." |
2419 | Integral Memory PLC. Unit 6 Iron Bridge Close Iron Bridge Business Park Off Great Central Way London, Middelsex NW10 0UF United Kingdom -Patrick Warley
-Samik Halai
|
Part # PS2251-15 |
N/A | 6/30/2014 |
SHA-256 
(BYTE-only) "The Integral Crypto AES 256 Bit USB 3.0 Hardware Library is intended for use with The Integral Crypto AES 256 Bit USB 3.0 Cryptographic Modules. The modules are removable storage devices which encrypt the content transferred onto them, and come in 2GB, 4GB, 8GB, 16GB, 32GB, 64GB, 128GB, 256GB, 512GB and 1TB sizes." |
2418 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Osamu Kawashima
|
Version 1.00 (Firmware) |
Cortex-R5 | 6/27/2014 |
SHA-256 
(BYTE-only) "a library of unique software and hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba enterprise HDD products and the systems using them a robust and secure data storage environment" |
2417 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version FOS 7.3.0 (Firmware) |
AMCC PPC 440EPX | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Brocade Cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules." |
2416 | Neopost Technologies, S.A. 113 Rue Jean Marin Naudin BAGNEUX, 92220 France -Nathalie TORTELLIER
|
Version A0038112A (Firmware) Part # A0014227B |
n/a | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Neopost Postal Secure Device (PSD) for low to high range of franking machines" |
2415 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Bill Zhao
|
Version 4.3 |
sVirtualized vSphere 5.1 / ESXi 5.1 hypervisor w/ Windows Server 2012 R2 x64 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2414 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Bill Zhao
|
Version 4.3 |
Virtualized vSphere 5.1 / ESXi 5.1 hypervisor w/ Windows 8.1 update 1 x64 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2413 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Bill Zhao
|
Version 4.3 |
Dell Precision M6400 Intel Core 2 Duo w/ Linux 64-bit RHEL 6.2 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2412 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core 2 Duo w/ Windows 7 32 bit | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2411 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core 2 i7 w/ Windows 7 32 bit with AESNI | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. It include" |
2410 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core i7 w/ Windows 7 64 bit with AESNI | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. " |
2409 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core i7 w/ Linux 32 bit RHEL 6.2 with AESNI | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. " |
2408 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Mac OS X 10.7 with AESNI w/ Apple MacBook Pro Intel Core i7 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2407 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 GA Patch 7 (Firmware) |
Intel Xeon | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS FIPS Cryptographic Library 5.0 GA Patch 7" |
2406 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP8 |
N/A | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP8 Cryptographic Library 5.0 GA Patch 7" |
2405 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP6 |
N/A | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP6 Cryptographic Library 5.0 GA Patch 7" |
2404 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 GA Patch 7 (Firmware) |
Intel Xeon | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS SSL Cryptographic Library 5.0 GA Patch 7." 07/10/14: Updated implementation information; |
2403 | N/A | N/A | N/A | 6/27/2014 | N/A |
2402 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Sandy Carielli
|
Version 4.1 |
Intel x86 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x86 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x86 with AES-NI w/ Windows Server 2008 Enterprise SP2 (/MD); Intel x86 without AES-NI w/ Windows Server 2008 Enterprise SP2 (/MD); Intel x86 with AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x86 without AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x64 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x64 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MD); Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MD); Intel x64 with AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x64 without AES-NI w/ Windows 7 Enterprise SP1 (/MD); Itanium2 w/ Windows Server 2003 Enterprise R2; Itanium2 w/ Windows Server 2008 Enterprise R2; Intel x86 with AES-NI w/ Windows Server 2003 Enterprise R2 on ESX 5.1 (/MT); Intel x86 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x86 with AES-NI w/ Windows Server 2008 Enterprise SP2 (/MT); Intel x86 without AES-NI w/ Windows Server 2008 Enterprise SP2 (/MT); Intel x86 with AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x86 without AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x64 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MT); Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MT); Intel x64 with AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 without AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 with AES-NI w/ Windows Server 2012 R2 Standard (/MT); Intel x64 without AES-NI w/ Windows Server 2012 R2 Standard (/MT); Intel x64 with AES-NI w/ Windows 8.1 Enterprise (/MT); Intel x64 without AES-NI w/ Windows 8.1 Enterprise (/MT); Itanium2 64-bit w/ Windows Server 2003 Enterprise R2; Itanium2 64-bit w/ Windows Server 2008 Enterprise R2; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 6.1 on ESXi 4.1; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 11 on ESX 4.0; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server11 on ESX 4.0; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 6.1 ESXi 4.1; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 6.1 on ESXi 4.1; Intel x64 with AES-NI w/ SUSE Linux Enterprise Server 11 on ESXi 4.1; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 11 on ESXi 4.1; Itanium2 64-bit w/ Red Hat Enterprise Linux 5.5; PPC 32-bit w/ Red Hat Enterprise Linux 5.3; PPC 32-bit w/ SUSE Linux Enterprise Server 11; PPC 64-bit w/ Red Hat Enterprise Linux 5.3; PPC 64-bit w/ SUSE Linux Enterprise Server 11; Intel x64 with AES-NI w/ FreeBSD 8.3 on ESXi 5.0; Intel x64 without AES-NI w/ FreeBSD 8.3 on ESXi 5.0; Intel x64 with AES-NI w/ Mac OS X 10.8; Intel x64 without AES-NI w/ Mac OS X 10.8; SPARC v8 w/ Solaris 10; SPARC v8+ w/ Solaris 11; SPARC v9 (T2) w/ Solaris 11; SPARC v9 (T4) with T4 accelerator w/ Solaris 11; SPARC v9 (T4) without T4 accelerator w/ Solaris 11; Intel x86 with AES-NI w/ Solaris 10 on ESXi 4.1; Intel x86 without AES-NI w/ Solaris 10 on ESXi 4.1; Intel x64 with AES-NI w/ Solaris 10; Intel x64 without AES-NI w/ Solaris 10; PA-RISC 2.0 32-bit w/ HPUX 11.31; PA-RISC 2.0W 64-bit w/ HPUX 11.31; Itanium2 32-bit w/ HPUX 11.31; Itanium2 64-bit w/ HPUX 11.31; PowerPC 32-bit w/ AIX 6.1 on Virtual I/O Server 2.2.2.1; PowerPC 64-bit w/ AIX 6.1 on Virtual I/O Server 2.2.2.1; PowerPC 32-bit w/ AIX 7.1 on Virtual I/O Server 2.2.2.1; PowerPC 64-bit w/ AIX 7.1 on Virtual I/O Server 2.2.2.1; IBM z196 31/32-bit w/ Red Hat Enterprise Linux 5.8 on z/VM 6.2; IBM z196 64-bit w/ Red Hat Enterprise Linux 5.8 on z/VM 6.2; ARMv7 w/ Ubuntu 12.04 LTS; ARMv7 w/ Fedora Core 17; Intel x86 w/ Android 4.0.3; ARMv7 w/ Android 2.3.6; ARMv7 w/ Android 4.1.2; ARMv7 w/ iOS 7.1; ARMv7s w/ iOS 7.1; PPC 604 w/ VxWorks 6.4; PPC 604 w/ VxWorks 6.7; ARMv4 w/ VxWorks 6.8 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
2401 | Digicine Oristar Technology Development (Beijing) Co., Ltd. No.1 Di Sheng West Street, BDA Da Xing District Beijing, 100176 China -Helen Li
|
Version 1.0 (Firmware) |
Freescale MCIMX515DJM8C | 6/30/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Oristar''s Integrated Media Block (IMB) product with its model number CHN-II supports 2K/4K Jpeg2000 image decoding for theatrical playback in Digital Cinemas." |
2400 | Software House, a Brand of Tyco International 6 Technology Park Drive Westford, MA 01886 USA -Lou Mikitarian
-Rick Focke
|
Version 2.1 |
ARM v7 i.MX6Q w/ Ubuntu Linux 12.04.2; Atmel 9260 w/ Windows CE v5.0 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The iSTAR Cryptographic Engine provides cryptographic services used for securing data and communications for the iSTAR Edge and iSTAR Ultra Door Controllers." |
2399 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Tom Nguyen
-Kevin Sze
|
Version R01.00.00 (Firmware) |
Atmel 5185912 Family | 6/27/2014 |
SHA-384 
(BYTE-only) "Firmware implementation of the Keyed-Hash Message Authentication Code in conjunction with the SHA-384 hash algorithm." |
2398 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2.105 (Firmware) |
RMI (Netlogic) XLS208 MIPS; RMI (Netlogic) XLS408 MIPS | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2397 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2.99 (Firmware) |
Freescale P2020 | 6/27/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2396 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 6.3.9600 |
NVIDIA Tegra 4 Quad-Core w/ Microsoft Surface 2 w/ Windows RT 8.1 (ARMv7 Thumb-2) ; NVIDIA Tegra 3 Quad-Core w/ Windows RT 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon S4 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon 400 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon 800 w/ Windows Phone 8.1 (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Microsoft Surface w/ Windows RT 8.1 (ARMv7 Thumb-2); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows 8.1 Enterprise (x86); AMD Athlon 64 X2 without AES-NI w/ Windows 8.1 Enterprise (x86); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows 8.1 Enterprise (x86); Intel Pentium without AES-NI w/ Windows 8.1 Enterprise (x86); Intel Core i3 without AES-NI and with PCLMULQDQ w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x86); AMD Athlon 64 X2 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x86); Intel Pentium without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows 8.1 Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Windows 8.1 Enterprise (x64); Intel Pentium without AES-NI w/ Windows 8.1 Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Pentium without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Server 2012 R2 (x64); AMD Athlon 64 X2 without AES-NI w/ Windows Server 2012 R2 (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Windows Server 2012 R2 (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Storage Server 2012 R2 (x64); AMD Athlon 64 X2 without AES-NI w/ Windows Storage Server 2012 R2 (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Windows 8.1 Enterprise (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro w/ Windows 8.1 Pro (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Windows 8.1 Pro (x64); Qualcomm Snapdragon S4 w/ Windows RT 8.1 (ARMv7 Thumb-2); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Windows Storage Server 2012 R2 (x64) ;  Intel Xeon E5-2648Lwithout AES-NI w/ Microsoft StorSimple 8100 w/ Microsoft Windows Server 2012 R2; Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 8.1 Pro (x64) | 6/6/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows RSA32 Library algorithm implementation is used by various Microsoft libraries to provide AES, RSA, and SHS (SHA) support." 07/10/14: Added new tested information; |
2395 | Digital Defence Ltd 400 Pavilion Drive Northampton Business Park Northampton, NN4 7PA United Kingdom -Ben Earl
|
Version 11.1.0.0 |
ARMv4i (as part of test platform, i.e. Motorola MC65 mobile handset) w/ Windows Mobile 6.5 | 5/30/2014 |
SHA-256 
(BYTE-only) "Secure Mobile is a security extension for Windows Mobile that provides device authentication, access control and storage encryption functionality. The concrete IUT here is a File System Filter (FSFilter) driver which is part of the Secure Mobile cryptographic module." |
2394 | Digital Defence Ltd 400 Pavilion Drive Northampton Business Park Northampton, NN4 7PA United Kingdom -Ben Earl
|
Version 11.1.0.0 |
ARMv4i (as part of test platform, i.e. Motorola MC65 mobile handset) w/ Windows Mobile 6.5 | 5/30/2014 |
SHA-256 
(BYTE-only) "Secure Mobile is a security extension for Windows Mobile that provides device authentication, access control and storage encryption functionality. The concrete IUT here is a Control Panel Applet (CPL) which is part of the Secure Mobile cryptographic module." |
2393 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 5.5.10 |
Intel Xeon QuadCore w/ CentOS 6.4 on VMware ESXi 5.1.0 | 5/30/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Accellion Kiteworks Cryptographic Module is a key component of Accellion''s Kiteworks product that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use." |
2392 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 1.0.1g |
Intel Xeon QuadCore w/ CentOS 6.4 on VMware ESXi 5.1.0 | 5/30/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Accellion Kiteworks Cryptographic Module is a key component of Accellion''s Kiteworks product that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use." |
2391 | Kaspersky Lab UK Ltd. 1st Floor, 2 Kingdom Street Paddington London, W2 6BD United Kingdom -Oleg Andrianov
|
Version 2.0 |
Intel(R) Core(TM)2 Duo P9600 @ 2.53GHz w/ Windows 7 Professional 32-bit; Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz w/ Windows 7 Enterprise 64-bit; Intel(R) Core(TM) i7-3770S CPU @ 3.10GHz w/ Windows 8.1 Enterprise 64-bit; Intel(R) Core(TM)2 Duo P9600 @ 2.53GHz w/ Kaspersky Preboot OS with BIOS | 5/30/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Kaspersky Cryptographic Library is a software library that provides cryptographic services for various Kaspersky Lab applications." 09/19/14: Added new tested information; |
2390 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Mike Yoder
-Ashvin Kamaraju
|
Version 2.0 |
Intel Core 2 Duo w/ Windows 2008 R2 | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "This module is a subset of the Vormetric Encryption Expert Agent, which in turn is part of the Vormetric Data Security solution. The Vormetric Encryption Expert Cryptographic Module interacts with the Vormetric Data Security Manager, which is itself a cryptographic hardware module." |
2389 | INSIDE Secure Arteparc Bachasson, Bât A Rue de la carrière de Bachasson, CS70025 Meyreuil, Bouches-du-Rhône 13590 France -Bob Oerlemans
|
Part # 1.1 |
N/A | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "VaultIP is a Silicon IP Security Module which includes a complete set of high- and low-level cryptographic functions. It offers key management and crypto functions needed for platform and application security such as Content Protection and Mobile Payment, and can be used stand-alone or as a ''Root of Trust'' to support a TEE-based platform." |
2388 | Qualcomm Technologies, Inc. 5775 Morehouse Dr San Diego, CA 92121 USA -Lu Xiao
|
Part # Snapdragon 805 |
N/A | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "This cryptographic module implements block ciphers including AES and Triple DES in multiple modes, hash algorithms including SHA-1 and SHA-256, and Message Authentication Codes including HMAC and CMAC." |
2387 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 13.3R1 (Firmware) |
Intel Xeon C3500/C5500 Series; Intel Xeon 5200 Series; Freescale e500v2; Freescale e5500 | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2386 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos 13.3R1 (Firmware) |
Intel Xeon C3500/C5500 Series; Intel Xeon 5200 Series; Freescale e500v2; Freescale e5500 | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system - Junos." |
2385 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 1.0.1c1 |
Dual Xeon QuadCore w/ Red Hat Enterprise Linux 5 | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use." |
2384 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version 1.0.0 |
Intel Core i5 w/ Windows 7 32-bit Kernel Mode; Intel Core i5 w/ Windows 7 64-bit Kernel Mode | 5/23/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba’s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols." |
2383 | Seagate Technology LLC. 1280 Disc Drive Shakopee, Minnesota 55379 US -David R Kaiser, PMP
|
Part # Tui |
N/A | 5/16/2014 |
SHA-256 
(BYTE-only) "AES encryption and decryption core of the controller ASIC "Tui" in Seagate''s Self- Encrypting Drives (SEDs). " |
2382 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 (Firmware) |
Intel Xeon | 5/9/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2381 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Tom Nguyen
-Rachel Michelson
|
Part # 51009397004 |
N/A | 5/9/2014 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) "Based on secure hash algorithm controller implemented in hardware - see chip spec section 36. The hardware supports SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. Only SHA-1 and SHA-384 are within scope of this evaluation." |
2380 | IP Cores, Inc. 3731 Middlefield Rd Palo Alto, CA 94303 USA -Dmitri Varsanofiev
|
Version 1.6 (MD5 checksum bd4250ea4cc2f5af1b41fca05d97339d) (Firmware) |
Xilinx Zynq®-7000 ARM Cortex-A9 | 5/9/2014 |
SHA-256 
(BYTE-only) "A compact yet high-performance PKCS #1 v 1.5 / RSA-2048 / SHA-256 software implementation targeting safe boot applications. Provided as a library for Bare-metal BSP and implemented in the Xilinx SDK FSBL for the Xilinx Zynq®-7000 All Programmable SoCs. Includes RSA key generation, signature generation and signature verification. RSAVS test bench." 06/06/14: Updated implementation information; |
2379 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Jason J Chen
-Joel Tang
|
Version 1.00 (Firmware) Part # PS2251-15 |
Phison PS2251-15 | 5/9/2014 |
SHA-256 
(BYTE-only) "Kingston''s DataTraveler DT4000 G2 Series USB Flash Drive is assembled in the US for organizations that require a secure way to store and transfer portable data. The stored data is secured by hardware-based AES-256 encryption to guard sensitive information in case the drive is lost or stolen." |
2378 | INSIDE Secure Eerikinkatu 28 Helsinki, 00180 Finland -Serge Haumont
-Marko Nippula
|
Version 1.0.3A |
ARMv7, 2.3 GHz w/ Android 4.4 | 5/9/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. The module is a toolkit which provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to, primitives for DAR, DRM, TLS, and VPN on mobile devices." |
2377 | SecuTech Solutions PTY LTD Suite 514, 32 Delhi Road North Ryde, NSW 2113 Australia -Fujimi Bentley
-Joseph Sciuto
|
Version 5.1.6 (Firmware) |
Hongsi 08k | 5/9/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The UniMate USB/TRRS (Audio Port) PKI token is a hardware cryptographic module. It provides digital signature generation/verification for online authentications and data encryption/decryption for online transactions. UniMate provides the USB interface and audio port (TRRS) that can connect the module to a computer and smart mobile device." 06/27/14: Updated implementation information; |
2376 | Siemens PLM Software 5800 Granite Parkway Suite 600 Plano, TX 75024 USA -Vikas Singh
|
Version 2.0 |
Intel Xeon w/ Windows 7 SP1; Intel Core 2 Duo w/ SUSE Linux 11.2; Intel Core i5 w/ Mac OS X 10.8 | 5/2/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals." |
2375 | Cyphercor Inc. 555 Legget Drive Suite 130 Kanata, ON K2K 2X3 Canada -Diego Matute
|
Version 1.0 |
Intel Xeon w/ CentOS 6 | 5/2/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The LoginTC Crypto Library is a suite of cryptographic services providing advanced cryptographic functionality for LoginTC multi-factor authentication and security solutions. Based on Bouncy Castle v1.50." |
2374 | Xirrus, Inc. 2101 Corporate Center Drive Thousand Oaks, CA 91320 USA -Mike de la Garrigue
|
Version 6.0 (Firmware) |
Cavium Octeon CN6000 series; Cavium Octeon CN5000 series | 5/2/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Xirrus AOS crypto library implementation." 08/07/14: Added new tested information; |
2373 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 6.3.9600 |
NVIDIA Tegra 4 Quad-Core w/ Microsoft Surface 2 w/ Windows RT 8.1 (ARMv7 Thumb-2); AMD Athlon 64 X2 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); AMD A4 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); Intel Pentium without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x64); Intel Pentium without AES-NI w/ Windows Embedded 8.1 Industry Enterprise (x86); AMD Athlon 64 X2 without AES-NI w/ Windows 8.1 Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Windows 8.1 Enterprise (x86); AMD A4 without AES-NI w/ Windows 8.1 Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); AMD A4 without AES-NI w/ Windows 8.1 Enterprise (x86); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows 8.1 Enterprise (x64); Intel Core i7 without AES-NI w/ Windows 8.1 Enterprise (x86); Intel Pentium without AES-NI w/ Windows 8.1 Enterprise (x64); Intel Pentium without AES-NI w/ Windows 8.1 Enterprise (x86); AMD Athlon 64 X2 without AES-NI w/ Windows Server 2012 R2 (x64); AMD A4 without AES-NI w/ Windows Server 2012 R2 (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); Intel Core i7 without AES-NI w/ Windows Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Windows Server 2012 R2 (x64); AMD Athlon 64 X2 without AES-NI w/ Windows Storage Server 2012 R2 (x64); AMD A4 without AES-NI w/ Windows Storage Server 2012 R2 (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Core i7 without AES-NI w/ Windows Storage Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Windows Storage Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Windows Storage Server 2012 R2 (x64); NVIDIA Tegra 3 Quad-Core w/ Windows RT 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon S4 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon 400 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon 800 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon S4 w/ Windows RT 8.1 (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Microsoft Surface w/ Windows RT 8.1 (ARMv7 Thumb-2) ;  Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Microsoft Windows 8.1 Enterprise (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro w/ Windows 8.1 Pro (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Windows 8.1 Pro (x64); Intel Xeon E5-2648Lwith AES-NI w/ Microsoft StorSimple 8100 w/ Microsoft Windows Server 2012 R2; Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 8.1 Pro (x64) | 5/2/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications." 07/21/14: Added new tested information; |
2371 | Alcatel-Lucent 600 - 700 Mountain Avenue Murray Hill, NJ 07974 USA -Yik-Ming Ho
|
Version 16.1-libengine-264 |
MPC8555 w/ Linux 2.6.10 | 4/25/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Alcatel-Lucent PSS32/16 Crypto-SNMP Engine offers an integrated AES256 encryption of control/status information for providing an equivalent level of security for the control link as is provided for the transmission links using the Alcatel-Lucent Crypto-OTU2 Engine." |
2370 | Alcatel-Lucent 600 - 700 Mountain Avenue Murray Hill, NJ 07974 USA -Yik-Ming Ho
|
Version 16.1-libengine-264 |
MPC8347 w/ Linux 2.6.10 | 4/25/2014 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Alcatel-Lucent PSS4 Crypto-SNMP Engine offers an integrated AES256 encryption of control/status information for providing an equivalent level of security for the control link as is provided for the transmission links using the Alcatel-Lucent Crypto-OTU2 Engine." |
2369 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA -Dave Riley
|
Version 01.01.0008 (Firmware) Part # MAX32590 Rev B4 |
N/A | 4/9/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) The implementation does not support length messages larger than Len=16384 "Pitney Bowes X4 HSM Cryptographic Module" |
2368 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.7 |
Freescale e500v2 (PPC) w/ Linux 2.6; Intel Core i7-3612QE (x86) without AES-NI w/ AcanOS 1.0; Intel Core i7-3612QE (x86) with AES-NI w/ AcanOS 1.0; Feroceon 88FR131 (ARMv5) w/ AcanOS 1.0; Intel Xeon E5440 (x86) without AES-NI w/ FreeBSD 8.4; Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 9.1; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 9.1; Xeon E5645 (x86) without AES-NI w/ ArbOS 5.3; ASPEED AST-Series (ARMv5) w/ Linux ORACLESP 2.6; Emulex PILOT3 (ARMv5) w/ Linux ORACLESP 2.6; Xeon E5645 (x86) with AES-NI w/ ArbOS 5.3 ;  Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 9.2; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 9.2 | 5/9/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 05/14/14: Added new tested information; |
2367 | Infotecs 41 Madison Avenue New York, New York 10010 USA -Andrey Krasikov
-Philippe Dieudonné
|
Version 1.0 |
Intel Core i7 w/ Windows 8.1 64-bit; ARMv7 w/ Android 4.4 | 4/9/2014 |
SHA-256 
(BYTE-only) "The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code." |
2366 | Infotecs 41 Madison Avenue New York, New York 10010 USA -Andrey Krasikov
-Philippe Dieudonné
|
Version 1.0 |
Intel Core i7 w/ Windows 8.1 64-bit | 4/9/2014 |
SHA-256 
(BYTE-only) "The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code." |
2365 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Part # MB8AC1292PBH-G-AWE1 |
N/A | 4/9/2014 |
SHA-1     
(BYTE-only) "The Ic ctrl1 Cipher is hardware implementation for RICOH ASIC MB8AC1292PBH-G-AWE1." |
2364 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Version 1.0 |
Intel Celeron Processor w/ Customized NetBSD 2.0.3 | 4/9/2014 |
SHA-256 
(BYTE-only) "The libgwguard is software for RICOH MFP controller." |
2363 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Version D1495559F (Firmware) |
Ru-30 | 4/9/2014 |
SHA-1     
(BYTE-only) "The FCU SHA-1 Moduleis firmware for RICOH Fax Controller." |
2362 | Morpho 18 chausee Jules Cesar Osny, France 95520 France -Omar Derrouazi
|
Part # SLE78C(L)FX4000P(M), SLE78C(L)FX3000P(M) |
N/A | 4/9/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The IDeal Citiz™ v2.0 Open is a single chip cryptographic module, which combines an implementation of the Sun Java Card Version 3.0.2 Classic Edition and GlobalPlatform Version 2.1.1 specifications on a dual interface chip (ISO 7816 contact and ISO 14443 contactless interface communication protocols)." |
2361 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 2.0 (Firmware) |
AMCC PowerPC 405EX; Cavium CN5020; Cavium CN5220; Cavium CN5230; Freescale 8752E; Freescale SC8548H; Intel Xeon; MPC8358E; MPC8572C; PowerPC 405; Intel Atom C2000 | 3/31/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Crypto Module" 01/30/15: Added new tested information; |
2360 | Zebra Technologies Corporation 3 Overlook Point Lincolnshire, IL 60069 USA -Tom McKinney
|
Version 1.02 |
TI OMAP4 w/ Android Jelly Bean 4.1.1 | 3/31/2014 |
SHA-256 
(BYTE-only) "Firmware loader library (libfirmware_loader.so) implements SHA256 and HMAC-SHA256. This is used for Self Integrity Test of the firmware loader module and firmware file''s .fips section." 05/02/14: Updated implementation information; |
2359 | Yubico, Inc. 228 Hamilton Avenue 3rd Floor Palo Alto, CA 94301 USA -Jakob Ehrensvard
|
Version 2.5.1 (Firmware) |
SunplusIT 8-bit CPU | 3/21/2014 |
SHA-1     
(BYTE-only) Implementation does not support messages lengths greater than 63 bytes. "The Yubikey is a two-factor authentication device supporting OATH-HOTP as well as the Yubico OTP algorithm. The device is connected via the USB ports and emulates a generic USB keyboard to allow a true driver-less installation." 09/19/14: Updated implementaiton information; |
2358 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.4.1.3 |
ARM 7 w/ Android KitKat 4.4.2 | 3/21/2014 |
SHA-1     
(BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This tests covers the asm AES and SHA1 implementations." |
2357 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SKC1.4.1.3 |
ARM 7 w/ Android KitKat 4.4.2 | 3/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2356 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Sandy Carielli
|
Version 3.0.0.21 |
MV78230 ARMv7 w/ TimeSys Linux Kernel 2.6.33RT; PJ4B-MP ARMv7 w/ TimeSys Linux Kernel 3.0.0 | 3/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
2355 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Mike Yoder
-Ashvin Kamaraju
|
Version 2.0 |
Power w/ AIX 6.1; Itanium w/ HPUX 11iv3; Intel Xeon with AES-NI w/ RHEL 6.3; Intel Xeon with AES-NI w/ SLES 11 SP 2 | 3/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "This module is a subset of the Vormetric Encryption Expert Agent, which in turn is part of the Vormetric Data Security solution. The Vormetric Encryption Expert Cryptographic Module interacts with the Vormetric Data Security Manager, which is itself a cryptographic hardware module." |
2354 | Atmel Corporation 2325 Orchard Parkway San Jose, CA 95131 US -Jim Hallman
-Todd Slack
|
Part # AT97SC3205 |
N/A | 3/21/2014 |
SHA-1     
(BYTE-only) "The AT97SC3205 is a single chip cryptographic module used for cryptographic key generation, key storage and key management as well as generation and secure storage for digital certificates." 04/03/14: Updated vendor information; |
2353 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core i7 w/ Linux 64 bit RHEL with AESNI | 3/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. It includ" |
2352 | Seagate Technology, LLC. 380 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Part # Karnak |
N/A | 3/21/2014 |
SHA-256 
(BYTE-only) "HW implementation of Secure Hash Algorithms in Seagate''s self encryption disk drives (SEDs)." |
2351 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Bill Zhao
|
Version 4.3 |
Dell Precision M6400 Intel Core 2 Duo w/ Windows 7 64 bit | 3/7/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email." |
2350 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 4.4 (Firmware) |
Freescale MPC8280 | 3/7/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CN1000 and CN3000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN1000 and CN3000 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." |
2349 | Dell SonicWALL 2001 Logic Drive San Jose, CA 95124 USA -Gary Tomlinson
-Usha Sanagala
|
Version 1.0.1e (Firmware) |
Intel Core 2 Duo; Intel Celeron; Intel Xeon Nehalem with AES-NI | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "AES Component implements all AES key sizes and modes to allow flexibility and efficiency. OpenSSL 1.0.1e implementation with minor patches." |
2348 | Dell SonicWALL 2001 Logic Drive San Jose, CA 95124 USA -Gary Tomlinson
-Usha Sanagala
|
Version 1.7.0_147 (Firmware) |
Intel Core 2 Duo; Intel Celeron; Intel Xeon Nehalem with AES-NI | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Using existing Debian Stable Open JDK binaries." |
2347 | Dell SonicWALL 2001 Logic Drive San Jose, CA 95124 USA -Gary Tomlinson
-Usha Sanagala
|
Version 10.7.1 (Firmware) |
Intel Core 2 Duo; Intel Celeron; Intel Xeon Nehalem with AES-NI | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "AES Component implements all AES key sizes and modes to allow flexibility and efficiency. AES/TDES/SHA/HMAC derived from OpenSSL implementations." |
2346 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 2.4 (Firmware) |
ARM Cortex A9 | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CN4010 and CN6010 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN4010 and CN6010 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." |
2345 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 2.4 (Firmware) |
Intel ATOM | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services." |
2344 | Hitachi, Ltd. 322-2 Nakazato Odawara-shi, Kanagawa-ken 250-0872 Japan -Hitachi, Ltd. Storage Systems Development Operation
|
Part # 2.0 |
N/A | 2/28/2014 |
SHA-256 
(BYTE-only) "n/a" |
2343 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Dell Precision M6400 Intel Core 2 Duo w/ Linux 32-bit RHEL 6.2 | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. It includes" |
2342 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -David Finkelstein
|
Version 4.3 |
Apple MacBook Pro Intel Core 2 Duo w/ Mac OS X 10.7 | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec PGP Cryptographic Engine is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for Symantec Encryption products, including the Symantec Drive Encryption, Symantec Desktop Email, Symantec File Share Encryption, Symantec Encryption Desktop, and Symantec Gateway Email. It includes" |
2341 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version 1.0 |
Intel (R) Xeon (R) Processor E5-2680 v2 (25M Cache, 2.80 Ghz w/ Brocade Vyatta Network OS | 2/28/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Built for Network Functions Virtualization (NFV), Brocade (R) Vyatta (R) 5650 and 5630 vRouters are the first virtual routers capable of providing advanced routing in software without sacrificing the relaibility and performance of hardware networking solutions." |
2340 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 |
Intel Atom D2500 w/ CentOS Linux 6.4 | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IOS software cryptographic implementations used within Cisco devices to provide cryptographic functions." |
2339 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale MPC8358E; Freescale MPC8548E | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IOS software cryptographic implementations used within Cisco devices to provide cryptographic functions." |
2338 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 2.0 (Firmware) |
AMCC PowerPC 405EX; Cavium CN5020; Cavium CN5220; Cavium CN5230; Freescale 8752E; Freescale SC8548H; Intel Xeon; MPC8358E; MPC8572C; PowerPC 405; Intel Atom C2000 | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Crypto Module." 04/04/14: Updated implementation information; |
2337 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.5.1f |
ARMv7 w/ Android 4.4 | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." |
2336 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP8 |
N/A | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP8 Cryptographic Library 5.0 GA Patch 6" |
2335 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP6 |
N/A | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP6 Cryptographic Library 5.0 GA Patch 6" |
2334 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP7 |
N/A | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP7 Cryptographic Library 5.0 GA Patch 6" |
2333 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 GA Patch 6 (Firmware) |
ARM v5 Compatible; Intel Atom; Intel Celeron; Intel i3-540 Dual Core; Intel i5-750 Quad Core; Intel Xeon | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS SSL Cryptographic Library 5.0 GA Patch 6" |
2332 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 GA Patch 6 (Firmware) |
ARM v5 Compatible; Intel Atom; Intel Celeron; Intel i3-540 Dual Core; Intel i5-750 Quad Core; Intel Xeon | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS FIPS Cryptographic Library 5.0 GA Patch 6" |
2331 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 0.9.8r |
Intel Xeon w/ VMware vCloud Networking and Security 5.5.0a vShield Manager OS | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms." |
2330 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 1.0.1e-64 |
Intel Xeon w/ VMware ESXi 5.5 | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms." |
2329 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 1.0.1e-32 |
Intel Xeon w/ VMware ESXi 5.5 | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms." |
2328 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 0.9.8h |
Intel Xeon w/ VMware vCloud Networking and Security 5.5.0a Data Security OS | 2/21/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms." |
2327 | Engage Communication, Inc. 9565 Soquel Drive Suite 201 Aptos, CA 95003 USA -Gian-Carlo Bava
-Shaun Tomaszewski
|
Version 2.0.5 (Firmware) |
ARM926EJ-S | 2/14/2014 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Engage Communication BlackVault cryptographic library provides a FIPS 140-2 approved Application Programming Interface (API) to the BlackVault Hardware Security Module (HSM). The library is based on OpenSSL FIPS version 2.0.5." |
2326 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Udayan Borkar
-Colin Cooper
|
Version 3.0 (Firmware) |
Broadcom XLR v4.0 | 2/14/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Quicksec is a third party source code, which provides IPsec and IKE v1 cryptographic services." |
2325 | Oracle America, Inc. 500 Oracle Parkway Redwood City, CA 94065 United States -Linda Gallops
|
Version 2.2 (Firmware) |
Altera NIOS II | 2/7/2014 |
SHA-1     
(BYTE-only) "The Oracle StorageTek T10000D Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. It delivers the world''s fastest write speeds to a native 8.5 TB of magnetic tape storagel; making it ideal for data center operations with growing data volume." |
2324 | Oracle America, Inc. 500 Oracle Parkway Redwood City, CA 94065 United States -Linda Gallops
|
Version 2.2 (Firmware) |
Altera NIOS II | 2/7/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Oracle StorageTek T10000D Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. It delivers the world''s fastest write speeds to a native 8.5 TB of magnetic tape storagel; making it ideal for data center operations with growing data volume." |
2323 | Cambium Networks 3800 Golf Road, Suite 360 Rolling Meadows, IL 60008 USA -Mark Thomas
|
Version PTP700-SHA-01-00 (Firmware) |
TI TMS320C6657 | 1/10/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SHA-256 hashing algorithm" |
2322 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 6.2 (Firmware) |
Cavium Octeon Plus 66XX; Cavium Octeon Plus 68XX | 1/24/2014 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks." |
2321 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Udayan Borkar
-Colin Cooper
|
Version 1.1.1 (Firmware) |
Broadcom XLR v4.0 | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "OpenSSL is a third party open source code, which provides cryptographic services to user space daemons. The device uses openssl-fips-1.1.1 version. RFS7000 userspace daemons (RADIUS, ntp, openssh, net-snmp, mapsh, etc) using openssl crypto services call fips_mode_set() from their respective initialization functions." |
2320 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Udayan Borkar
-Colin Cooper
|
Version 1.2 (Firmware) |
Cavium Octeon Plus CN5000 Family | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "OpenSSL is a third party open source code, which provides cryptographic services to user space daemons. The device uses openssl-fips-1.2 version. AP7131N userspace daemons (RADIUS, ntp, openssh, net-snmp, etc) using openssl crypto services call fips_mode_set() from their respective initialization functions." |
2319 | Green Hills Software 30 W Sola Street Santa Barbara, CA 93101 USA -David Sequino
-Douglas Kovach
|
Version 2.0.415 |
ARM Cortex A9 w/ Green Hills Software INTEGRITY Multivisor v4 for ARM | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Green Hills Software ISS ECT is a standards-based crypto toolkit providing a flexible framework to integrate encryption, digital signatures and other security mechanisms into a wide range of applications. ISS ECT is designed to support multiple cryptographic providers with a single common API, easily targeted to a variety of Operating Systems." |
2318 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version 1.0.0 |
Intel Core i5 w/ Mac OS X 10.8; Apple A6 w/ Apple iOS 7 | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba’s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols." |
2317 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version 1.0.0 |
Intel Core i5 w/ Red Hat Enterprise Linux 6 32-bit; ARMv7 w/ Android 4 | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba’s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols." |
2316 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version 1.0.0 |
Intel Core i5 w/ Windows 7 32-bit User Mode; Intel Core i5 w/ Windows 7 64-bit User Mode | 12/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba’s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols." 06/11/14: Added new tested information; |
2315 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Rose Quijano-Nguyen
|
Version 1.1 |
Sun UltraSPARC III w/ Solaris 10; Intel Xeon X34xx w/ Windows 2012; Intel Xeon X34xx w/ RHEL 6.4 64-bit | 12/20/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec Cross-Platform Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec Cross-Platform Cryptographic Module. This module supports Symantec Applications by providing validated Cryptographic Services. The incorporation of these algorithms make these products ideal for enterprise and government applications." 01/10/14: Updated implementation information; |
2314 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # 15-14497-02(NX315) |
N/A | 12/20/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ACT-2Lite is an ASSP which is based on a smart card hardware platform with custom ROM code provided by Cisco." |
2313 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.5.1f |
ARMv7 w/ Android 4.3; ARMv7 w/ Android 4.4; PowerQuicc II Pro w/ VxWorks 6.8; ;  Freescale P2020 w/ Mentor Embedded Linux 4.0; Qualcomm MSM8974 w/ Linux 3.4; Qualcomm MSM8992 w/ Linux 3.10 | 12/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." 03/11/14: Added new tested information; |
2312 | ND SatCom Products GmbH Graf von Soden Strasse Immenstaad, N/A 88090 Germany -Dr. Michael Weixler
-Petra Visuri
|
Version 2.002.4 (Firmware) Part # F-11B13860 TQM8349L-CA rev. 300 |
Freescale MPC8349E | 12/20/2013 |
SHA-256 
(BYTE-only) "FIPS approved algorithms: DSA & SHA-256 used in Boot Loader Firmware to verify signed ND SatCom FIPS module Application and Boot Loader firmware for SkyWAN 7000 series Satellite modems." |
2311 | ND SatCom Products GmbH Graf von Soden Strasse Immenstaad, N/A 88090 Germany -Dr. Michael Weixler
-Petra Visuri
|
Version 7.250.6 (Firmware) Part # F-11B13860 TQM8349L-CA rev. 300 |
Freescale MPC8349E | 12/20/2013 |
SHA-256 
(BYTE-only) "FIPS approved algorithms: AES, DSA, RNG and SHA functions implemented for crypto functionality of the ND SatCom FIPS Module, a multichip embedded hardware engine providing AES256 encryption services for Ethernet & Frame-Relay/Serial data traffic and MF-TDMA control signaling for the SkyWAN 7000 Series Satellite modems." |
2310 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version bl3.0.3.0 (Firmware) |
Texas Instruments TMS320C6416T | 12/20/2013 |
SHA-512 
(BYTE-only) "BL SHA Component implements one SHA hash size only to reduce cryptographic complexity of Boot Loader as far as possible. BL SHA is needed by Boot Loader for software integrity tests." |
2309 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version smos3.1.2.1 (Firmware) |
Texas Instruments TMS320C6416T | 12/20/2013 |
SHA-512 
(BYTE-only) "SMOS SHA Component implements one SHA hash size to reduce cryptographic complexity of SMOS module as far as possible. SMOS SHA is needed by SMOS for software integrity tests." |
2308 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
-Dieter Bong
|
Version hash1.0.8.0 (Firmware) |
Texas Instruments TMS320C6416T | 12/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HASH Component implements all SHA hash sizes to allow flexibility and efficiency." |
2307 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.1.2 |
Intel Xeon w/ VMware ESXi v5.1 with SGOS v6.5.2 | 12/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Blue Coat SG VA Crypto Engine v1.0 provides the necessary cryptographic services to a proprietary operating system (SGOS 6.5.2) developed specifically for use in Blue Coat''s Secure Web Gateway virtual appliance." |
2306 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 4.5 |
Intel Xeon w/ VMware ESXi v5.1 with SGOS v6.5.2 | 12/20/2013 |
SHA-1     
(BYTE-only) "The Blue Coat SG VA Starter provides the security services necessary to perform integrity testing on virtual appliance cryptographic module deployments." |
2305 | N/A | N/A | N/A | 12/20/2013 | N/A |
2303 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ Microsoft Windows Server 2008 R2 running on VMware ESXi v5.1 Update 1; Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (64-bit) running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware vSphere Web Client Cryptographic Engine is based on Bouncy Castle v1.39" |
2302 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (64-bit) running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware vSphere Appliance Cryptographic Engine for Linux is based on OpenSSL 0.9.8h. It is used to provide Cryptographic Support for the vCenter Server Appliance." |
2301 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ Microsoft WIndows Server 2008 R2 running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The vSphere Cryptographic Engine for Windows is based on OpenSSL 0.9.8t. This library is used to implement cryptographic support for the following components: vSphere Client, vCenter Server, vCenter Inventory Service, vSphere Update Manager, and vSphere Syslog Collector." |
2300 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (64-bit) running on VMware ESXi v5.1 Update 1; Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (32-bit) running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware vSphere Common Cryptographic Engine for Linux is based on OpenSSL 0.9.8r. It is used to provide Cryptographic Support for the vCLI on Linux systems as well as the vCenter Server Appliance." |
2299 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (64-bit) running on VMware ESXi v5.1 Update 1; Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (32-bit) running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware vSphere Core Cryptographic Engine for Linux is based on OpenSSL 0.9.8t. It is used to provide Cryptographic Support for the vCLI on Linux systems as well as the vCenter Server Appliance" |
2298 | Palo Alto Networks 4401 Great America Parkway Santa Clara, California 95054 USA -Jake Bajic
-Lee Klarich
|
Version PAN-OS 5.0/Panorama 5.1 (Firmware) |
Cavium Octeon MIPS64; Intel Multi Core Xeon; Intel Celeron P4505 | 12/18/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e., the PA-200, PA-500, PA-2000, PA-3000, PA-4000 and PA-5000 firewalls and M100 Centralized Management. The firewalls provide network security by enabling enterprises to see/control applications, users, and content." |
2297 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ Microsoft Windows Server 2008 R2 running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware ESXi Cryptographic Engine is based on OpenSSL 0.9.8t." |
2296 | Barco N.V. Noordlan 5 Kuurne, , 8520 Belgium -Jean-Paul Schafer
|
Version 1_1_23.0.0 (Firmware) Part # BG160526 |
Stratix IV GX FPGA | 12/18/2013 |
SHA-1     
(BYTE-only) "Implementation on a Stratix IV FPGA" |
2295 | Barco N.V. Noordlan 5 Kuurne, , 8520 Belgium -Jean-Paul Schafer
|
Version 0.1.6533 Part # bg140778 |
Freescale Q or IQ P2040 Power-PC w/ Linux 3.0.48-rt70.2-svn5965 | 12/18/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Implementation on a Freescale Power_PC, using the OpenSSL Library" |
2294 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ SuSE Linux Enterprise Server 11 SP2 (64-bit) running on VMware ESXi v5.1 Update 1;Intel Xeon w/ Microsoft Windows Server 2008 R2 running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware vCenter Single Sign-On Cryptographic Engine is based on the Oracle Java Cryptographic Extension provider for the Java Runtime Environment version 1.6." |
2293 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.1 |
Intel Xeon w/ 64 bit library running on VMware ESXi v5.1 Update 1; Intel Xeon w/ 32 bit library running on VMware ESXi v5.1 Update 1 | 12/18/2013 |
SHA-1     
(BYTE-only) "The VMware ESXi Cryptographic Engine is based on OpenSSL 0.9.8t." |
2292 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.1.2 (Firmware) |
Intel Xeon E5-2418L; Intel Xeon E5-2430; Intel Xeon E5-2658; | 12/18/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Blue Coat Crypto Library v1.0 provides the necessary cryptographic services to a proprietary operating system (SGOS 6.5.2) developed specifically for use in Blue Coat''s ProxySG line of appliances." |
2291 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.15 (Firmware) |
Intel Xeon E5-2418L; Intel Xeon E5-2430; Intel Xeon E5-2658 | 12/18/2013 |
SHA-1     
(BYTE-only) "The Blue Coat UEFI Loader v1.0 provides the security services necessary to perform integrity testing on their Blue Coat''s ProxySG appliance line." |
2290 | Giesecke & Devrient GmbH Prinzregentenstraße 159 München, n/a 81677 Germany -Katharina Wallhäußer
|
Version 2.0 (Firmware) |
SLE78CLFX4000P(M) / M7892 family | 12/18/2013 |
SHA-1     
(BYTE-only) "Sm@rtCafé Expert 7.0 C1 is a Java Card 3 Platform Classic Edition compliant to GlobalPlatform CS V2.2.1 and GP V2.2 Amd D." |
2289 | Giesecke & Devrient GmbH Prinzregentenstraße 159 München, n/a 81677 Germany -Katharina Wallhäußer
|
Version 2.0 (Firmware) |
SLE78CLFX4000P(M) / M7892 family | 12/18/2013 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sm@rtCafé Expert 7.0 C1 is a Java Card 3 Platform Classic Edition compliant to GlobalPlatform CS V2.2.1 and GP V2.2 Amd D." |
2288 | Giesecke & Devrient GmbH Prinzregentenstraße 159 München, n/a 81677 Germany -Katharina Wallhäußer
|
Version 1.2 (Firmware) |
SLE78CLFX4000P(M) / M7892 family | 12/18/2013 |
SHA-256 
(BYTE-only) "Sm@rtCafé Expert 7.0 C1 is a Java Card 3 Platform Classic Edition compliant to GlobalPlatform CS V2.2.1 and GP V2.2 Amd D." |
2287 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 |
Intel Core i5 with AES-NI and RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i3 without AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i5 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i7 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i3 without AES-NI, with RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i7 with AES-NI and RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i5 without AES-NI or RdRand w/ Windows 8 running in 32-bit UEFI mode; Intel Atom without AES-NI or RdRand w/ Windows 8 running in 32-bit UEFI mode; Intel Core 2 Duo without AES-NI or RdRand w/ Macintosh platform running EFI preboot; Intel Xeon without AES-NI or RdRand w/ Macintosh platform running EFI preboot; Intel Core i3 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i5 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i7 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i3 without AES-NI or RdRand w/ Windows XP 32-bit; Intel Core i3 without AES-NI or RdRand w/ Windows 7 64-bit; Intel Core i7 with AES-NI and RdRand w/ Windows 7 64-bit; Intel Core i7 with AES-NI and RdRand w/ Windows 8 64-bit; Intel Atom without AES-NI or RdRand w/ Windows 8 32-bit; Intel Core 2 Duo without AES-NI or RdRand w/ MacOS X Lion v10.7; Intel Xeon without AES-NI or RdRand w/ MacOS X Mountain Lion v10.8; Intel Core i3 with AES-NI and RdRand w/ MacOS X Mountain Lion v10.8; Intel Core i5 with AES-NI and RdRand w/ MacOS X Lion v10.7; Intel Core i7 with AES-NI and RdRand w/ MacOS X Mountain Lion v10.8; Intel Core i5 with AES-NI but not RdRand w/ Windows Vista 32-bit; Intel Core i7 with AES-NI but not RdRand w/ Windows Vista 64-bit; Intel Core i5 with AES-NI but not RdRand w/ Windows 7 32-bit; Intel Core i5 with AES-NI and RdRand w/ Windows 8 32-bit; Intel Core i5 with AES-NI and RdRand w/ Windows 8 64-bit | 12/13/2013 |
SHA-256 
(BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Endpoint Encryption product range." 12/18/13: Added new tested information; |
2286 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA -Dave Riley
|
Version 9.02.00 (Firmware) Part # MAXQ1959B-F50# |
N/A | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) This implementation does not support message lengths greater than 4096. "N/A" |
2285 | JVC KENWOOD Corporation 1-16-2, Hakusan, Midori-ku Yokohama-shi Kanagawa, 226-8525 Japan -Tamaki Shimamura
|
Version 2.0.0 (Firmware) |
Texas Instruments C55xx DSP | 12/13/2013 |
SHA-256 
(BIT) "An implementation of AES and SHA-256 designed for use in JVC KENWOOD secure communications products." |
2284 | Tripwire, Inc. 101 SW Main St. Suite 1500 Portland, OR 97204 USA -Brian R. Cox
|
Version 2.0.0 |
Oracle Java 1.6 w/ Microsoft Windows Server 2008 R2 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provides an AES implementation for Tripwire products." |
2283 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 1.0 |
Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a Edge OS running on VMware vSphere Hypervisor (ESXi) 5.5 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "The VMware Kernel Cryptographic Module is a flexible software library providing FIPS-140-2 approved cryptographic operations for VMware products and platforms."" 12/27/13: Updated implementation information; |
2282 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-3.0 (Firmware) |
Freescale MPC 7448, RISC, 1700 MHz; | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLXe Series and Brocade NetIron® CER 2000 Series Ethernet Routers, Brocade NetIron CES 2000 Series Ethernet Switches provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." 02/18/14: Update vendor information; |
2281 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-3.0 (Firmware) |
Freescale MPC 7447A, RISC, 1000MHz | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLXe Series and Brocade NetIron® CER 2000 Series Ethernet Routers, Brocade NetIron CES 2000 Series Ethernet Switches provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." |
2280 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-3.0 (Firmware) |
Freescale MPC 8544, Power QUICC III, 800 MHz | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLXe Series and Brocade NetIron® CER 2000 Series Ethernet Routers, Brocade NetIron CES 2000 Series Ethernet Switches provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." |
2279 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3.2 |
Intel Xeon w/ VMware ESXi v5.0 with SecureOS 8.3 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Firewall Enterprise 64-bit Cryptographic Engine (Virtual) is a software library that provides cryptographic services for applications on virtual deployments of the McAfee Firewall Enterprise Appliance." |
2278 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3.2 (Firmware) |
Intel Atom; Intel Core; Intel Pentium; Intel Xeon | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Firewall Enterprise 64-bit Cryptographic Engine is a firmware library that provides cryptographic services for applications across several versions of the McAfee Firewall Enterprise Appliances." |
2277 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3.2 |
Intel Xeon w/ VMware ESXi v5.0 with SecureOS 8.3 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Firewall Enterprise 32-bit Cryptographic Engine (Virtual) is a software library that provides cryptographic services for applications on virtual deployments of the McAfee Firewall Enterprise Appliance." |
2276 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3.2 (Firmware) |
Intel Atom; Intel Core i3; Intel Pentium; Intel Xeon | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Firewall Enterprise 32-bit Cryptographic Engine is a firmware library that provides cryptographic services for applications across several versions of the McAfee Firewall Enterprise Appliances." |
2275 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA |
Version 1.2 |
Intel Xeon w/ Windriver Linux (2.6.99.99 kernel) | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The openssl crypto library is used on the Nexus7K supervisor to implement crypto operations in software." |
2274 | DragonWave, Inc. 600-411 Legget Drive Ottawa, ON K2K3C9 Canada -Justin Wintour
-Ingrid Mag
|
Version 1.3 (Firmware) |
Freescale MPC8313 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The DragonWave Secure Cryptographic Module firmware implementation provides peer-to-peer TLS communications for the management path established between two Quantum radio links." |
2273 | DragonWave, Inc. 600-411 Legget Drive Ottawa, ON K2K3C9 Canada -Justin Wintour
-Ingrid Mag
|
Version 1.2.5 (Firmware) |
Freescale MPC8313 | 12/13/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The DragonWave Secure Cryptographic Module firmware implementation provides peer-to-peer TLS communications for the management path established between two Compact+ radio links." |
2272 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Chela Diaz de Villegas
|
Version 1.0 |
Intel Xeon E5 32-bit w/ Windows 2008 R2; Intel Xeon E5 64-bit w/ Windows 2008 R2 | 12/6/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "McAfee ePO Agent Handler Cryptographic Module provides cryptographic operations for McAfee ePolicy Orchestrator (ePO), a security management software that allows enterprises to unify the management of numerous end-point, network, and data security products." |
2271 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA |
Version 1.0 |
Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a vShield Manager OS with Sun JRE 6.0 running on VMware vSphere Hypervisor (ESXi) 5.5 | 12/6/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Java JCE (Java Cryptographic Extension) module is a versatile software library that implements FIPS-140-2 approved cryptographic services for VMware products and platforms." 12/06/13: Updated implementation information; |
2270 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 6.1 |
Intel Celeron w/ McAfee Linux 2.2.1; Intel Xeon w/ McAfee Linux 2.2.1 | 12/6/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2269 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 6.1 |
Intel Xeon w/ McAfee Linux 2.2.1 running on VMware ESXi 5.0 | 12/6/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2268 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 1.0 |
Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a Edge OS on VMware Sphere Hypervisor (ESXi) 5.5; Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a vShield Manager OS (VMware vCloud Networking and Security 5.5.0a App Firewall OS) on VMware vSphere Hypervisor (ESXi) 5.5 | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms." 12/27/13: Updated implementation information; |
2267 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 1.0 |
Intel Xeon E5-2430 with AES-NI w/ VMware vCloud Networking and Security 5.5.0a Edge OS running on VMware vSphere Hypervisor (ESXi) 5.5 | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VMware NSS Cryptographic Module is a software cryptographic library that provides FIPS-140-2 validated network security services to VMware products" 12/27/13: Updated implementation information; |
2266 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2 (Firmware) |
P1020, 800 Mhz, PowerPC; XLP432, 1.4 Ghz, MIPS; XLR 732, 950 Mhz, MIPS; XLS208, 750 Mhz, MIPS | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2265 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-Crypto-Ver-3.0 (Firmware) |
Freescale MPC8544E, 800 MHz | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade ICX6610 delivers wire-speed, non-blocking performance across all ports to support latency-sensitive. The Brocade FCX Series offers a comprehensive line of switches with specific models optimized for campus and data center deployment." |
2264 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Hirotaka Kondo
-Shigeki Yamamoto
|
Version 1.0.0 (Firmware) |
Xilinx Kintex-7 FPGA | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sony IMB SHS Core-K1 is the firmware module for digital cinema system." |
2263 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Hirotaka Kondo
-Shigeki Yamamoto
|
Version 1.0.0 (Firmware) |
Xilinx Kintex-7 FPGA | 11/29/2013 |
SHA-1     
(BYTE-only) "Sony IMB SHS Core-K2 is the firmware module for digital cinema system." |
2262 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories No.99, Dianyan Rd. Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 3.5 (Firmware) |
Renesas RS-4 series | 11/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HiCOS PKI Native Smart Card is a dual interface (ISO 7816 & ISO 14443) cryptographic smart card and supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, RSA 2048 encrypt/decrypt (including RSA-CRT), RSA digital signature generation /verification(including RSA-CRT)" |
2261 | IBM 9032 South Rita Road Tucson, AZ 85744 USA -Christine Knibloe
|
Version 1.0 (Firmware) |
IBM PowerPC 405 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO Ultrium 6 tape drive." |
2260 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-Crypto-Ver-3.0 (Firmware) |
ARM ARMv5TE, 800 MHz | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. Brocade ICX6450 switches deliver enterprise-class stackable switching at an entry-level price." |
2259 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-Crypto-Ver-3.0 (Firmware) |
Freescale P3041E, 1.5 GHz | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The FastIron SX Series extends control from the network edge to the core with intelligent network services, such as Quality of Service (QoS) and provides a scalable, secure, low-latency, and fault-tolerant IP services solution for 1GbE and 10 GbE enterprise deployments." |
2258 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-Crypto-Ver-3.0 (Firmware) |
Freescale P2041, 1.5GHz | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade ICX 7750 is an Ethernet switch for campus LAN aggregation and classic Ethernet data center Top of Rack (ToR) environments." |
2257 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-Crypto-Ver-3.0 (Firmware) |
Freescale MPC8544E, 800 MHz | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade ICX 6650 is an Ethernet switch for campus LAN aggregation and classic Ethernet data center Top of Rack (ToR) environments." |
2256 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 4.1 |
ARM Cortex-A9 w/ Android 4.0; Intel Xeon w/ Windows 7; Freescale PowerPC-e500 w/ Linux 2.6; Intel Xeon with AES-NI w/ Windows 7; Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ Linux 2.6; Intel Xeon with AES-NI w/ Linux 2.6 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." |
2255 | AEP Networks, Ltd. Knaves Beech Business Centre Loud Water, High Wycombe, Buckinghamshire HP10 9UT United Kingdom -Paul Kettlewell
-Vicky Hayes
|
Version 011395 v2 r3 (Firmware) |
P2020 QorIQ | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AEP Networks Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Model 9860 family." |
2254 | Guidance Software, Inc 1055 E. Colorado Blvd. Pasadena, CA 91106 USA -Ken Basore
|
Version 1.0 |
Intel Core i7 w/ Windows Server 2008 R2 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "EnCase® Enterprise provides comprehensive forensic-level analysis of servers and workstations anywhere on a network. The solution can securely investigate/analyze multiple machines simultaneously over the LAN/WAN at the disk and memory level." |
2253 | Guidance Software, Inc 1055 E. Colorado Blvd. Pasadena, CA 91106 USA -Ken Basore
|
Version 1.0 |
Intel Core i7 w/ Windows Server 2008 R2 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "EnCase® Enterprise provides comprehensive forensic-level analysis of servers and workstations anywhere on a network. The solution can securely investigate/analyze multiple machines simultaneously over the LAN/WAN at the disk and memory level." |
2252 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
Intel Xeon Quad-Core (Westmere) | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data and content data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data." |
2251 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
Intel Xeon Quad-Core (Westmere) | 11/22/2013 |
SHA-1     
(BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data and content data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data." |
2250 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version ArubaOS 6.3 (Firmware) |
Broadcom XLS204; Broadcom XLS408; Broadcom XLR508; Broadcom XLR516; Broadcom XLR532; Broadcom XLR732; Broadcom XLP416; Broadcom XLP432; Qualcomm Atheros AR7242; Qualcomm Atheros AR7161; Qualcomm Atheros QCA9550; Cavium CN5010; Marvell 88F6560; Qualcomm Atheros QCA9344; Freescale QorIQ P1020 | 11/22/2013 |
SHA-1     
(BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2249 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version ArubaOS 6.3 (Firmware) |
Qualcomm Atheros AR7161; Qualcomm Atheros AR7242; Cavium CN5010; Marvell 88F6560; Qualcomm Atheros QCA9344; Qualcomm Atheros QCA9550; Broadcom XLP416; Broadcom XLP432; Broadcom XLR732; Broadcom XLR508; Broadcom XLR516; Broadcom XLR532; Broadcom XLS204; Broadcom XLS408; Freescale QorIQ P1020 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.." |
2248 | Lancope, Inc. 3650 Brookside Parkway, Suite 400 Alpharetta, GA 30022 USA -Jason Anderson
-Jim Magers
|
Version 1.1 |
Intel Xeon E3 series w/ Stealthwatch v6.3; Intel Xeon E5 series w/ Stealthwatch v6.3 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J implementations used within Lancope’s StealthWatch products provide cryptographic functions" |
2247 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 4.1 |
Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ FreeBSD 9.0; Intel Xeon with AES-NI w/ Windows 8.1; Intel Xeon w/ Windows 8.1 | 11/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." 07/31/15: Added new tested information; |
2246 | Aruba Networks, Inc. 1344 Crossman Ave Sunnyvale, CA 94089 USA -Jon Green
|
Version ArubaOS 6.3 (Firmware) |
Broadcom XLS204; Broadcom XLS408; Broadcom XLR508; Broadcom XLR516; Broadcom XLR532; Broadcom XLR732; Broadcom XLP416; Broadcom XLP432; Qualcomm Atheros AR7242; Qualcomm Atheros AR7161; Qualcomm Atheros QCA9550; Cavium CN5010; Marvell 88F6560; Qualcomm Atheros QCA9344; Freescale QorIQ P1020 | 11/15/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks." |
2245 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2 (Firmware) |
Freescale MPC8314, 333MHZ, PowerPC; Freescale P2020, 1.0GHz, PowerPC; Freescale P4080, 1.5GHZ, PowerPC; Broadcom XLR732, 1.0GHz, MIPS | 11/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2244 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2 (Firmware) |
XLP432, 1.4GHz, MIPS; XLR732, 950MHz, MIPS; XLS208, 750MHz, MIPS | 11/15/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Hardware accelerator is a CPU functional module that provides cryptographic functions within HP devices." |
2243 | Allegro Software Development Corporation 1740 Massachusetts Avenue Boxborough, MA 01719 USA -Alan Presser
|
Version 1.1.8 |
Intel Core 2 Duo E8400 w/ Windows 7 Ultimate (64-bit) | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange." |
2242 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Bob Pittman
|
Version 5.2 (Firmware) |
Freescale P2020, 1000MHz, PowerPC | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2241 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Laurie Smith
|
Version 6.10.4 (Firmware) |
AMCC 440EPx PowerPC (PPC440EPx) Embedded Processor | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor." 12/01/14: Updated implementation information; |
2240 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Laurie Smith
|
Version 6.10.4 (Firmware) |
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor." 12/01/14: Updated implementation information; |
2239 | Box, Inc. 4440 El Camino Real Los Altos, CA 94022 USA -Crispen Maung
|
Version 1.0 |
Intel(R) Xeon(R) w/ Scientific Linux 6.4 with Java JRE 1.6.0 running on VMware vSphere 5.0; Intel(R) Xeon(R) w/ Scientific Linux 6.4 with Java JRE 1.7.0 running on VMware vSphere 5.0 | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Box JCA Cryptographic Module is a Java Cryptography Architecture provider that provides encryption, hashing and random number generation utilizing FIPS 140-2 validated algorithms." 11/15/13: Added new tested information; |
2238 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -n/a |
Version 7.1 |
MPC8544 w/ Comware V7.1; XLS408 w/ Comware V7.1 | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2237 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Jim Dickens
-Chris Brych
|
Part # SF114-011206-001A, v2.9.2 |
N/A | 11/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution." |
2236 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Part # CNN3530 |
N/A | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 11/12/13: Added new tested information; |
2235 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Part # CNN3510 |
N/A | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 11/12/13: Added new tested information; |
2234 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Part # CN1610 |
N/A | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." |
2233 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2232 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2231 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2230 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2229 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2228 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A7 w/ iOS 7 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2227 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-2.0 (Firmware) |
Freescale 8544E | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade ICx 6610 delivers wire-speed, non-blocking performance across all ports to support latency-sensitivity. The Brocade FCX Series offfers a comprehensive line of switches with specific models optimized for campus and data center deployments. " 11/08/13: Updated implementation information; |
2226 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-2.0 (Firmware) |
ARMv5TE, 800 MHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. Brocade ICX6450 switches deliver enterprise-class stackable switching at an entry-level price." |
2225 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-2.0 (Firmware) |
Freescale P3041E, 1.5 GHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The FastIron SX Series extends control from the network edge to the core with intelligent network services, such as Quality of Service (QoS) and provides a scalable, secure, low-latency and fault-tolerant IP services solution for 1 GbE and 10 GbE enterprise deployments." |
2224 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRC-IP-CRYPTO-VER-2.0 (Firmware) |
Freescale MPC8544E, 800 MHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade ICX 6500 Switch is a compact Ethernet switch that delivers industry-leading 10/40 GbE density." |
2223 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO_VER-2.0 (Firmware) |
Freescale MPC8544, PowerQUICC III, 800 MHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLX Series and NetIron CER 2000 Series provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS and MPLS Virtual Private Networks (VPNs). " |
2222 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-2.0 (Firmware) |
Freescale MPC7448, RISC, 1700 MHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLX Series and NetIron CER 2000 Series provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS and MPLS Virtual Private Networks (VPNs)." |
2221 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version BRCD-IP-CRYPTO-VER-2.0-0131131200 (Firmware) |
Freescale MPC 7447A, RISC, 1000MHz | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade MLX Series and NetIron CER 2000 Series provide industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS and MPLS Virtual Private Networks (VPNs)." 11/08/13: Updated implementation information; |
2220 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA -Stephen T Palermo
-Min Cao
|
Version 1.0.0 Part # Intel® Communications Chipset 8950 |
Intel® Xeon® Processor E5-2600 v2 Product Family processor w/ Fedora 16 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Intel® Xeon® Processor E5-2600 v2 Product Family processor with Intel® Communications Chipset 89xx Series using Intel® QuickAssist Technology. The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms." 11/05/13: Updated implementation information; |
2219 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Rose Quijano-Nguyen
|
Version 1.1 |
Intel Xeon Quad Core w/ RHEL 6.4 x86_64 64-bit | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec SymCrypt Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec SymCrypt Cryptographic Module. This module supports Symantec Applications by providing validated and approved Cryptographic Services. The incorporation of these algorithms make these products ideal for enterprise and government applications." |
2218 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Sandeep Kaushik
-Nui Chan
|
Version 1 (Firmware) |
Cavium OCTEON Plus CN5860 | 10/25/2013 |
SHA-1     
(BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic media module" |
2217 | Sonus Networks, Inc. 4 Technology Park Drive Westford, MA 01886 USA -Sandeep Kaushik
-Nui Chan
|
Version 1 |
Intel Nehalem w/ Sonus Debian Linux 02.00.02-A026 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic software module" |
2216 | Sonus Networks 4 Technology Park Drive Westford, MAS 01886 USA -Sandeep Kaushik
-Nui Chan
|
Version 1 |
Intel Nehalem w/ Sonus Debian Linux 02.00.02-A026 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sonus Session Border Controller FIPS-validated cryptographic accelerator module" |
2215 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
|
Version 0.9.8 |
Intel E5620 Quad Core w/ Linux x86_64 | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to "inspect" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic." |
2214 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA -Raman Sudhir
-Min Cao
|
Version 1.0.0 |
Intel® Atom(TM) Processor C2000 Product Family for Communications w/ Yocto 1.4 (BSP included in the release software) | 10/25/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Intel® Atom(TM) Processor C2000 Product Family for Communications is a system on a chip (SoC) which incorporates cryptographic acceleration. The acceleration features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms." 11/05/13: Updated implementation information; |
2213 | EFJohnson Technologies 1440 Corporate Drive Irving, TX 75038-2401 USA -Marshall Schiring
-Josh Johnson
|
Version 5.0 (Firmware) |
Texas Instruments TMS320VC55xx | 10/25/2013 |
SHA-256 
(BYTE-only) "(1) EFJ Crypto description: The EFJ Crypto includes SP800-90A DRBG, RSA, HMAC, SHA256, AES for use in the EFJohnson Subscriber Encryption Module." |
2212 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Chris Brych
|
Version MAL1.1 (Firmware) |
Intel Core 2 Duo w/ Fedora Core 3 | 10/25/2013 |
SHA-256 
(BYTE-only) "The SafeNet Luna EFT Cryptographic Library firmware provides a wide range of cryptographic functions." |
2211 | Vaultive, Inc. 489 5th Avenue, floor 31 New York, NY 10017 USA -Steve Coplan
|
Version 1.0 |
Intel Xeon E5 series with AES-NI w/ Ubuntu Server 12.04LTS | 10/1/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Vaultive Cryptographic Module implements several NIST-approved cryptographic algorithms. Vaultive Inc. uses the Vaultive Cryptographic Module to deliver cloud encryption solutions preserving server-side operations including indexing, searching, record sorting and format preservation without compromising security." |
2210 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 4.0 |
ARM Cortex-A9 w/ Android 4.0; Intel Xeon w/ Windows 7; Freescale PowerPC-e500 w/ Linux 2.6; Freescale PowerPC-e500 w/ Linux 2.6; Intel Xeon with AES-NI w/ Windows 7; Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ Linux 2.6; Intel Xeon with AES-NI w/ Linux 2.6 | 10/1/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." |
2209 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 4.0 |
Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ FreeBSD 9.0 | 10/1/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." |
2208 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Cavium CN5200; Freescale P1021; Intel 82576; Freescale MPC8358E; Freescale MPC8572E | 10/1/2013 |
SHA-512 
(BYTE-only) "IOS-XE Firmware image signing cryptographic implementations used within Cisco devices to provide image integrity." |
2207 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -David Schmolke
-Rich Quintana
|
Version ES_Cryptoservices_1.0 (Firmware) |
Altera Cyclone III FPGA | 10/1/2013 |
SHA-512 
(BYTE-only) "ViaSat Embeddable Security System cryptographic algorithm implementations." |
2206 | Entrust, Inc. One Lincoln Centre 5400 LBJ Freeway Suite 1340 Dallas, TX 75240 USA -Greg Wetmore
-Mark Joynes
|
Version 8.1Sp1 R2 |
Intel Core 2 Duo E8400 w/ Microsoft Windows Server 2008 R2 Enterprise Edition | 9/27/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Security Kernel is a C++ implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware or both. The industry standard Cryptoki API from PKCS #11, is used as the interface to hardware-based cryptographic modules." |
2205 | BlackBerry 295 Phillip Street Waterloo, ON N2L3W8 Canada -Security Certifications Team
|
Version 6.1 |
Intel Xeon X5650 w/ CentOS 5.5 Linux 32-bit; Intel Xeon X5650 w/ CentOS 5.5 Linux 64-bit; Intel Xeon X5650 w/ Windows XP 32-bit; Intel Xeon X5650 w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 | 9/30/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Algorithm Library is a suite of cryptographic algorithms that provides advanced cryptographic functionality to systems running BlackBerry 10 OS and components of BlackBerry Enterprise Service 10." |
2204 | Microsemi Corporation One Enterprise Aliso Viejo, CA 92656 USA -Richard Newell
|
Version 1.0 (Firmware) |
Mentor Graphics Questa Simulator 10.1c | 9/27/2013 |
SHA-256 
(BIT) "The Microsemi SoC Cryptographic Module provides custom hardware/firmware acceleration of the standard cryptographic algorithms used in Microsemi FPGAs and SoC FPGAs like SmartFusion®2 and Igloo®2. They are used to securely configure the devices, and are also made available to the FPGA user via an internal bus interface for use in end applications." 09/30/13: Updated implementation information; |
2203 | IBM z/VM Design and Development 1701 North Street Building 250-2 Endicott, NY 13760 U.S. -Brian W. Hugenbruch
|
Version 6.3 plus APAR PM95516 Part # 5741-A08 |
System z10 Enterprise Class processor w/ IBM z/VM V6.3 | 9/27/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files." |
2202 | RICOH COMPANY, LTD. Ricoh Building, 8-13-1 Ginza Chuo-ku, Tokyo 104-8222 Japan |
Version 1.0 |
PMC-Sierra RM7035 w/ Customized NetBSD 2.0.3 | 9/27/2013 |
SHA-256 
(BYTE-only) "The libgwguard is software for RICOH MFP controller." |
2201 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Udayan Borkar
-Colin Cooper
|
Version 1.2.3 (Firmware) |
RMI XLR V0.4 | 9/27/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512_256  (BIT) Implementation does not support zero-length (null) messages. "OpenSSL is a third party open source package which provides cryptographic services to userspace daemons. Version is openssl-fips-1.2.3. Userspace daemons (like RADIUS, openssh) use openssl crypto services. fips_mode_set() is invoked from respective daemon initialization functions." |
2200 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version Rel 1 (1.0.0) (Firmware) |
Freescale MPC8572E | 9/11/2013 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Cryptographic Module within cat4k" |
2199 | WatchDox, Inc. 299 S California Ave. Palo Alto, CA 94306 USA -Adi Ruppin
|
Version 1.0 |
ARM Cortex A9 w/ Android 4.1; ARMv7 w/ Apple iOS 6.1; Intel Xeon without AES-NI w/ Red Hat Enterprise Linux 6; Intel Core (x64) with AES-NI w/ Windows 7 32-bit | 9/11/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The WatchDox Crypto Module provides the services necessary to support the cryptographic features and functions of the WatchDox Secure File Sharing services and products." |
2198 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale MPC8572E | 9/11/2013 |
SHA-512 
(BYTE-only) "IOS-XE Firmware image signing cryptographic implementations used within Cisco devices to provide image integrity." |
2197 | Box, Inc. 4440 El Camino Real Los Altos, CA 94022 USA -Crispen Maung
|
Version 1 |
Intel(R) Xeon(R) w/ Scientific Linux 6.4 running on VMware vSphere 5.0 | 9/11/2013 |
SHA-1     
(BYTE-only) "Box''s cryptographic module is a C language-based implementation of cryptographic functions built using an OpenSSL FIPS Object Module. Box provides assurance that content encrypted by the product utilizes a FIPS 140-2 solution." 09/24/13: Updated implementation information; |
2196 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Stan Mesceda
-Chris Brych
|
Version 4.3 (Firmware) |
Motorola Freescale MPC8280 (PPC32) | 8/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SxE Cryptographic Library provides cryptographic algorithms for the SxE family of products. Based on OpenSSL, the SxE Cryptographic Library exposes an Application Programming Interface (API) to support software based security relevant services within SafeNet''''s SxE product line." |
2195 | Lumeta Corporation 300 Atrium Drive Suite 302 Somerset, New Jersey 08873 USA -Matt Webster
|
Version 5.5 |
Intel x86_64 Processor w/ FreeBSD 8.1 | 8/29/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IPsonar scans a network to discovery its infrastructure - including network address spaces, connectivity flows, hosts, devices and leaks. It identifies and examines network-connected assets in order to create a topological view. IPsonar can be deployed as a single standalone appliance or as a collection of cooperating appliances." |
2194 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale P1021; Freescale MPC8343A; Freescale MPC8358E | 8/29/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "This is the algorithm implementations for Cisco IOS wireless appliances." |
2193 | AirTight® Networks 339 N. Bernardo Avenue Suite 200 Mountain View, CA 94043 USA -Sri Sundaralingam
|
Version 6.7.U4.48 FIPS (Firmware) |
AR9350 from Atheros Communications | 8/29/2013 |
SHA-1     
(BYTE-only) "The implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks." |
2192 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
ARM v5 Compatible; Intel Celeron; Intel Core 2 Duo; Intel i5-750 Quad Core; Intel Xeon; Intel i3-540 Dual Core | 8/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS SSL Cryptographic Library v4.0 MR3 Build 3767, running on Intel x86 compatible processors." 10/01/13: Added new tested information; |
2191 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
ARM v5 Compatible; Intel Celeron; Intel Core 2 Duo; ARM v5 Compatible; Intel Xeon; Intel i5-750 Quad Core; Intel i3-540 Dual Core | 8/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS FIPS Cryptographic Library v4.0 MR3, Build 3767, running on Intel x86 compatible processors." 10/01/13: Added new tested information; |
2190 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA -Robert Magnant
-Elias Theodorou
|
Version 2.00 (Firmware) |
Broadcom XLS108 | 8/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "This is a firmware library that provides the cryptographic functions used on Harris'' industry leading reliable, secure and high performance Broadband Ethernet Radio (BER) products: RF-7800W-OU50x, -OU47x, -OU49x." |
2189 | SafeNet Canada, Inc. 20 Colonnade Road, Suite 200 Ottowa, ON K2E 7M6 Canada -Chris Brych
-Iain Holness
|
Version 3.20.01 (Firmware) |
Intel 80219 (ARM V5T) | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet PSG Firmware provides a wide range of cryptographic functions." |
2188 | M5 Network Security Level 1 218 Northbourne Avenue Braddon, ACT 2612 Australia -Warwick Hoyle
|
Version kernel-PAE-2.6.32.14-127.scs.fips.fc12.i686 |
Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ Linux 2.6.32; Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ Linux 2.6.32 | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The M5 Secure Communications System (SCS) is a next-generation secure communications solution for military, government and large corporations. The SCS has been designed to allow mobile teams to securely exchange data in a cost-effective manner, with minimal administrative and configuration overheads." |
2187 | United States Special Operations Command (USSOCOM) 7701 Tampa Point Boulevard MacDill Air Force Base, Florida 33621-5323 USA -William W. Burnham
|
Version 1.0 |
Intel Xeon E5530; Qualcomm Snapdragon S2 MSM8655 | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BIT) "KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Suite B-compliant, standards based, AES/GCM-256 layer of encrypted communications between a BlackBerry Enterprise Server (BES) and a BlackBerry Mobile Set (MS) with Elliptic Curve (EC) key exchange used to negotiate symmetric keys." 07/25/14: Updated implementation information; |
2186 | RSA Security, Inc. 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 4.1 |
PowerPC (32bit) w/ Linux 2.6 with Sun JRE 5.0; ARM9 (32bit) w/ Linux 2.6 with Sun JRE 6.0 | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" |
2185 | Dell, Inc. 1925 Isaac Newton Square East Suite 440 Reston, VA 20190 USA -Joe Leslie
-Jason Raymod
|
Version 1.0 |
Intel Xeon with AES-NI w/ Windows 2008 R2 64-bit; Intel Xeon with AES-NI w/ Windows 2012 64-bit; Intel Xeon w/ Windows 2008 R2 64-bit; Intel Xeon w/ Windows 2012 64-bit | 8/16/2013 |
SHA-512 
(BYTE-only) "The Dell AppAssure Crypto Module provides data encryption functionality. The Module is a software component used by other software products to encrypt and decrypt data. The Module implements AES (Rijndael) CBC mode functions. Physically, the Module is a DLL file delivered with a file containing the DLL''s digital signature." |
2184 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Manny Novoa
|
Version 1.5 |
MPC8347 w/ Embedded Linux with Kernel v2.6.32; MPC8535 w/ Embedded Linux with Kernel v2.6.32 | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "HP Virtual Connect is a set of interconnect modules and embedded software for HP BladeSystem c-Class enclosures that controls the configuration and administration of server connections. The cryptographic functions of Virtual Connect provide security for remote administration by limiting access to HTTPS and SSH protocols only." |
2183 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Akihiro Kimura
|
Part # 88SS9036 |
N/A | 8/16/2013 |
SHA-256 
(BYTE-only) "a library of unique software and hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba enterprise SSD products and the systems using them a robust and secure data storage environment" |
2182 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Cavium CN5200; Freescale MPC8572E; Intel 82576; Freescale P1021; Freescale MPC8358E | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IOS Firmware cryptographic implementations used within Cisco devices to provide cryptographic functions." 01/30/14: Updated implementation information; |
2181 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 |
Intel Core i5 with AES-NI and RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i3 without AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i5 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i7 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i3 without AES-NI, with RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i7 with AES-NI and RdRand w/ Windows 8 running in 64-bit UEFI mode; Intel Core i5 without AES-NI or RdRand w/ Windows 8 running in 32-bit UEFI mode; Intel Atom without AES-NI or RdRand w/ Windows 8 running in 32-bit UEFI mode; Intel Core i3 with AES-NI and RdRand w/ MacOS X Mountain Lion v10.8; Intel Core i5 with AES-NI and RdRand w/ MacOS X Lion v10.7; Intel Core i7 with AES-NI and RdRand w/ MacOS X Mountain Lion v10.8; Intel Core i5 with AES-NI but not RdRand w/ Windows Vista 32-bit ; Intel Core i7 with AES-NI but not RdRand w/ Windows Vista 64-bit; Intel Core i5 with AES-NI but not RdRand w/ Windows 7 32-bit; Intel Core i5 with AES-NI and RdRand w/ Windows 8 32-bit; Intel Core i5 with AES-NI and RdRand w/ Windows 8 64-bit; Intel Core 2 Duo without AES-NI or RdRand w/ Macintosh platform running EFI preboot; Intel Xeon without AES-NI or RdRand w/ Macintosh platform running EFI preboot; Intel Core i3 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i5 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i7 with AES-NI and RdRand w/ Macintosh platform running EFI preboot; Intel Core i3 without AES-NI or RdRand w/ Windows XP 32-bit; Intel Core i3 without AES-NI or RdRand w/ Windows 7 64-bit; Intel Core i7 with AES-NI and RdRand w/ Windows 7 64-bit; Intel Core i7 with AES-NI and RdRand w/ Windows 8 64-bit; Intel Atom without AES-NI or RdRand w/ Windows 8 32-bit; Intel Core 2 Duo without AES-NI or RdRand w/ MacOS X Lion v10.7; Intel Xeon without AES-NI or RdRand w/ MacOS X Mountain Lion v10.8; | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Endpoint Encryption product range." 11/19/13: Updated implementation; |
2180 | Integral Memory PLC. Unit 6 Iron Bridge Close Iron Bridge Business Park Off Great Central Way London, Middelsex NW10 0UF United Kingdom -Patrick Warley
-Samik Halai
|
Part # PS2251-13 and PS2251-15 |
N/A | 8/16/2013 |
SHA-256 
(BYTE-only) "The Integral Memory AES USB 3.0 drives are removable storage devices which encrypt data transferred onto them. They offer Premium AES 256 bit security, and come in various sizes." |
2179 | FRAMA AG Unterdorf Lauperswil, Bern CH-3438 Switzerland -Beat Waelti
|
Version V2.0.6 (Firmware) Part # FRM-II Version 1.2 |
firmware: running on built-in Fujitsu MB91302APM1R micro controller | 8/16/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines." |
2178 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 0.98 (Firmware) |
Freescale MPC8280 | 7/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CN1000 and CN3000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN1000 and CN3000 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." 09/30/13: Updated vendor information; |
2177 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 0.98 (Firmware) |
Intel ATOM | 7/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services." 09/30/13: Updated vendor information; |
2176 | Senetas Corporation Ltd. and SafeNet Inc. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Chris Brych
|
Version 0.98 (Firmware) |
Intel Core 2 Duo LGA775; AMD Geode LX800 | 7/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CS Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CS10 and CS100 Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services." |
2175 | Vidyo, Inc. 433 Hackensack Avenue Hackensack, NJ 07601 USA -Adi Regev
|
Version 1.0 |
quad-core Nvidia Tegra 3 w/ Android 4.1.1; TI dual-core OMAP4470 w/ Kindle 8.4.3; dual-core Nvidia Tegra 2 w/ Android 4.1.1;quad-core Cortex A9 (T30L) w/ Android 4.2.2; quad-core Cortex-A9 w/ Android 4.1.2; dual-core ARM Cortex-A9 w/ Android 4.0.4; single-core ARM Cortex-A8 w/ Android 4.1.2; ARMv7s Apple A6X w/ iOS 6.1; ARMv7s Apple A6 w/ iOS 6.1 | 7/22/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Vidyo creates HD video conferencing products that leverage their patented Adaptive Video Layering Architecture technology, which provides continuous HD video streaming regardless of network conditions. The Vidyo Cryptographic Security Kernel supplies the cryptographic services necessary to support Vidyo''s secure video and data transmissions." |
2174 | Sourcefire, Inc. 9770 Patuxent Woods Drive Columbia, Maryland 21046 USA -Quang Trinh
|
Version 1.0 |
Intel Xeon w/ Linux v5.2, 64-bit; Intel Xeon w/ Linux v5.2, 32-bit | 7/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Sourcefire 3D System Cryptographic Module is a library that provides cryptographic functions for the Sourcefire 3D System line of appliances." |
2173 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Security Evaluations Manager
|
Version 1.1 |
Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; SPARC 64 w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 | 7/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oracle Solaris OS utilizes the Oracle Solaris Kernel Cryptographic Framework module to provide cryptographic functionality for any kernel-level processes that require it, via Oracle-proprietary APIs." 08/12/13: Added new tested information; |
2172 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2171 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2170 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2169 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2168 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2167 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256. The SHA implmentation is based on revision Security-1498." |
2166 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 1.0 |
IBM PowerPC w/ AIX 6.1; Itanium w/ HP-UX 11.31; Intel Xeon w/ RHEL 5.9; Intel Xeon w/ CentOS 5.5; Intel Xeon w/ SUSe 11 patch 2; Sparc 64 w/ Solaris 10; AMD Opteron w/ Windows Server 2008 R2; Intel Xeon w/ Windows Server 2008 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Database Security Sensor Cryptographic Module Version 1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of Database Security Sensor products." |
2165 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Security Evaluations Manager
|
Version 1.1 |
Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; SPARC 64 w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for applications running in user space. It exposes three public interfaces to provide cryptography to any application designed to utilize them." 08/12/13: Added new tested information; |
2164 | Certicom Corp. 4701 Tahoe Blvd. Building A Missisauga, ON L4W 0B5 Canada -Certicom Sales
-Ian Laidlaw
|
Version 6.1 |
Intel x86 (Xeon X5650) w/ CentOS Linux 32-bit; Intel x64 (Xeon X5650) w/ CentOS Linux 64-bit; Intel x86 (Xeon X5650) w/ Windows XP 32-bit; Intel x64 (Xeon X5650) w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules." |
2163 | Arista Networks Inc. 5453 Great America Pkwy Santa Clara, CA 95054 USA -Richard Whitney
|
Version 1.0.0e-fips (Firmware) |
AMD Turion™ II Neo N41H Dual-Core ;  Intel Pentium; Intel Xeon | 7/15/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner." 05/06/14: Updated vendor and implementation information; |
2162 | Neopost Technologies, S.A. 113 Rue Jean Marin Naudin BAGNEUX, 92220 France -Nathalie Tortellier
|
Version A0018324A (Firmware) Part # A0014227B |
NXP LPC 3220 32-bit ARM microcontroller | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Neopost Postal Secure Device (PSD) for low to high range of franking machines" |
2161 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Nancy Canty
|
Version 2.0 (Firmware) |
AMCC 440GX | 7/5/2013 |
SHA-1     
(BYTE-only) "Cryptographic algorithms implemented in the BorderGuard DPF1 firmware." |
2160 | IBM Corporation 1 New Orchard Road Armonk, NY 10504 USA -Smita Dutta
|
Version 2.0 (Firmware) |
Intel Xeon | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. The IBM Security QRadar SIEM provides a secure platform that meets FIPS 140-2 Level 2 requirements while allowing organizations to meet current and emerging compliance mandates." 01/10/14: Added new tested information; |
2159 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 3.1.1 (Firmware) |
AMD64 Opteron (Istanbul); AMD64 Opteron (Shanghai); Intel Clarkdale; Intel Lynnfield; VIA NANO | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SGOS 6.5 Cryptographic Library provides the necessary cryptographic services to Blue Coat’s proprietary operating system (SGOS 6.5), developed specifically for use on their family of Unified Security and Optimization solutions for business assurance." |
2158 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 1.0 (Firmware) Part # 294.012 |
Imation 294.012 | 7/5/2013 |
SHA-256 
(BYTE-only) "The IronKey Workspace W700 includes Super Speed hardware-based 256-bit AES cryptography engine for encryption and decryption and RAM buffers via USB. It also includes RSA-2048, HMAC, and SHA-256 algorithms." |
2157 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 2.1 |
ARMv7 w/ Android 4.0; PowerPC, Freescale's PowerQUICC III Processor Family w/ Linux 2.6 | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." |
2156 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # 15-14497-02(AT90S072) |
N/A | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ACT-2Lite is an ASSP which is based on a smart card hardware platform with custom ROM code provided by Cisco." 12/20/13: Updated implementation information; |
2155 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.4.5-9 |
Xeon E5540 w/ MLOS v2.2 running on VMware ESXi 4.1; Xeon E5540 w/ MLOS v2.2 running on VMware ESXi 5.0 | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2154 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.4.5-9 (Firmware) |
Celeron E3400; Core i3; Xeon E5540 | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2153 | Pulse Secure, LLC. 2700 Zanker Road, Suite 200 San Jose, CA 95134 USA -Yvonne Sang
|
Version 1.0 |
Intel Pentium E2160 (x86) w/ IVE OS 1.1; Intel Xeon E5530 (x86) w/ IVE OS 1.1 on VMware ESX; Intel Xeon x5670 (x86) with AES-NI w/ IVE OS 1.1 on VMware ESXi; Intel Core i5-2430M (x86) 64-bit with AES-NI w/ Microsoft Windows 7; Intel Core i5-2430M (x86) 32-bit with AES-NI w/ Microsoft Windows 7; Intel Core i7-3615QM (x86) with AES-NI w/ OS X 10.8; Intel Xeon x5670 (x86) w/ IVE OS 1.1 on VMware ESXi; Intel Core i7-3615QM (x86) w/ OS X 10.8 | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Secure Pulse Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies." 01/26/15: Updated vendor information; |
2152 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Version 1.0 |
Intel Xeon w/ Redhat Enterprise Linux 5 running on KVM 0.14; Intel Xeon w/ Redhat Enterprise Linux 5 running on VMWare ESXi 4.0; Intel Xeon w/ Redhat Enterprise Linux 5 running on Citrix XenServer 6.0 | 7/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SoftAX, part of A10 Networks'' award-winning AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure." 08/15/13: Added new tested information; |
2151 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
|
Version 1.0 |
Intel Xeon E5620 w/ VMware ESXi 5.0 | 6/28/2013 |
SHA-256 
(BYTE-only) "VxBIOS Cryptographic Library provides HMAC cryptographic services for the SafeNet ProtectV StartGuard cryptographic module." |
2150 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 3.7.2tS (Firmware) |
Freescale Semiconductor 8548 Power QUICC; Intel Xeon | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The ASR 1000 Routers accelerate services by offering performance and resiliency with optimized, intelligent services." 07/03/13: Updated implementation information; |
2149 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale P1010 | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Firmware algorithm implementations for the ONS encryption cards." |
2148 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2147 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale MPC8568E | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Firmware algorithm implementations for the ONS controller cards." |
2146 | AFORE Solutions Inc. 2680 Queensview Drive Unit 150 Ottawa, ON K2B 8J9 Canada -Tim Bramble
-Hans Johnsen
|
Version 1.0 |
Intel Xeon E5-2420 w/ Linux Ubuntu 12.04 with VMWare ESXi 5.1.0 | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CloudLink Cryptographic Module is a general purpose cryptographic library which provides cryptographic services for all CloudLink application modules." 02/21/14: Updated implementation information; |
2145 | BlackBerry 295 Phillip Street Waterloo, ON N2L3W8 Canada -Eric Jen
|
Version 1.0 |
Intel Xeon 3430 w/ Ubuntu 12.04; Intel Xeon 3430 w/ Ubuntu 12.04 on ESXi 5.1; AMD Opteron 275 w/ Ubuntu 12.04; AMD Opteron 275 w/ Ubuntu 12.04 on ESXi 5.1; ARMv7-based A5 processor w/ iOS 5.0; ARM v7s -- Apple A6 w/ iOS 6.0; ARMv7-based Qualcomm Snapdragon processor w/ Android v4.1 | 6/28/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Algorithm Library for Secure Work Space provides a suite of cryptographic services utilized by the BlackBerry Cryptographic Library for the BlackBerry Secure Work Space (BBSWS). BBSWS provides the secure operation and management of iOS and Android devices when used in conjunction with BlackBerry® mobile device management solutions." |
2144 | Kanguru Solutions 1360 Main Street Millis, MA 02054 USA -Nate Cte
|
Version V01.04.0000.0000 (Firmware) |
TSI-1480 OX3010 | 6/20/2013 |
SHA-256 
(BYTE-only) "The Kanguru Dfender HDD 3000 is a hardware encrypted USB security device designed for secure data storage. It is also used as a platform to run secure virtual operating systems and applications." |
2143 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Main Office
-Victor Wolff
|
Version 1.2.1 (Firmware) |
Intel® Xeon | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." |
2142 | Fujitsu limited 4-1-1 Kamikodanaka Nakahara-ku Kawasaki, Kanagawa 211-8588 Japan -Eugene Owens
|
Version V20L80-1000 (Firmware) |
Intel(R) XEON(R) | 6/20/2013 |
SHA-256 
(BYTE-only) "ETERNUS DX400/DX8000 Controller Module is a module which manages the whole disk storage system. In order to prevent a data leakage by removal of disks, the disk encryption mechanism encrypts data on the disks. This encryption function is valid if the Disk Encryption mechanism is activated through GUI." |
2141 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2140 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set compiled for 32bit word size." |
2139 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2138 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 compiled for 32bit word size." |
2137 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2136 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software compiled for 32bit word size." |
2135 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2134 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2133 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2132 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2131 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2130 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2129 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2128 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2127 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i7 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2126 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
2125 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2124 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Intel i5 w/ OSX 10.9 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2123 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2122 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2121 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
2120 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2119 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
2118 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2117 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2116 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
2115 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A6 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2114 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A5 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2113 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 4.0 |
Apple A4 w/ iOS 7 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
2112 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
-Tom Tkacik
|
Version CAVP_RNG4_4.2_C290R1 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/20/2013 |
SHA-256 
(BYTE-only) "Freescale''s RNG4 4.2 is included in multiple QorIQ Integrated Communications Processor, including: T4240r2, T2080, T1040, and the C29x family of security co-processors." |
2111 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
-Tom Tkacik
|
Version CAVP_RNG4_4.1_P5040R1 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/20/2013 |
SHA-256 
(BYTE-only) "Freescale''s RNG4 4.1 is included in multiple QorIQ Integrated Communications Processor, including: T4240r1, P5040, and QorIQ Qonverge products B4860r1." |
2110 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
-Tom Tkacik
|
Version CAVP_MDHA_2.3_C290R1 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BIT) SHA-512_256  (BIT) "Freescale''s MDHA 2.3 is included in multiple QorIQ Integrated Communications Processor, including: T4240r2, T2080, T1040, and the C29x family of security co-processors." |
2109 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
-Tom Tkacik
|
Version CAVP_MDHA_2.2_P4080R3 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BIT) SHA-512_256  (BIT) "Freescale''s MDHA 2.2 is included in multiple QorIQ Integrated Communications Processor, including: P4080r3, P5040, and QorIQ Qonverge products B4860r1." |
2108 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
-Tom Tkacik
|
Version CAVP_MDHA_2.1_PSC9131R1 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BIT) SHA-512_256  (BIT) "Freescale''s MDHA 2.1 is included in the QorIQ Qonverge processors, PSC9131 and PSC9132." |
2107 | OpenPeak, Inc. 1750 Clint Moore Road Boca Raton, FL 33487 USA -Eric Jen
-Howard A. Kwon
|
Version 1.0.1 |
Intel Xeon 3430 w/ Ubuntu 12.04; Intel Xeon 3430 w/ Ubuntu 12.04 on ESXi 5.1; AMD Opteron 275 w/ Ubuntu 12.04; AMD Opteron 275 w/ Ubuntu 12.04 on ESXi 5.1; ARM v7 -- Apple A5 w/ iOS 5.0; ARMv7-based A6 processor w/ iOS 6.0; IARMv7-based Qualcomm Snapdragon processor w/ Android v4.1 | 6/20/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenPeak Cryptographic Security Library provides advanced cryptographic functionalities for the OpenPeak Cryptographic Security Module (OCSM). The OCSM provides a secure encrypted container for enterprise-managed applications, content and data to enable a highly secure mobile workspace." |
2106 | Hewlett Packard India Software Operations Pvt Ltd Sy. No. 192, Whitefield Road Mahadevpura Post Bangalore, Karnataka 560048 India -Rahul Philip Mampallil
-Karthik Bhagawan
|
Version 1.0 |
Intel Itanium w/ HP-UX 11i v3 | 6/7/2013 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HP-UX Kernel Crypto Module (HP-UX KCM) is a kernel-space shared library in the HP-UX OS containing core cryptographic algorithms in one central place. It implements asymmetric, symmetric, message authentication, and digest operations used by various HP-UX products. It is available on HP-UX 11i v3 OS on HP Integrity Platform." |
2105 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.01 |
Xeon w/ MLOS v2.2 running on VMware ESXi 4.1; Xeon w/ MLOS v2.2 running on VMware ESXi 5.0 | 6/7/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances." |
2104 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.01 (Firmware) |
Celeron; Intel Core i3; Xeon | 6/7/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances." |
2103 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 3.0.0.20 |
PowerPC e500v2 w/ VxWorks General Purpose Platform 6.8 | 5/31/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
2102 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.5 |
Freescale i.MX27 926ejs (ARMv5TEJ) w/ eCos 3; Freescale i.MX25 (ARMv4) w/ QNX 6.4; Apple A6X Soc (ARMv7s) w/ iOS 6.1; Intel Xeon E3-1220 w/ VMware Horizon Workspace 1.5 under vSphere; Intel Xeon E3-1220 w/ AES-NI w/ VMware Horizon Workspace 1.5 under vSphere; AM335x Cortex-A8 (ARMv7) w/ Ubuntu 13.04; ARM926 (ARMv5TEJ) w/ Linux 3.8; AM335x Cortex-A8 (ARMv7) with NEON w/ Ubuntu 13.04; Intel Xeon E5-2430L (x86) without AES-NI w/ Linux 3.4 64-bit under Citrix XenServer; Intel Xeon E5-2430L (x86) with AES-NI w/ Linux 3.4 64-bit under Citrix XenServer; Intel Xeon E5-2430L (x86) without AES-NI w/ Linux 3.4 64-bit on under VMware ESX; Intel Xeon E5-2430L (x86) with AES-NI w/ Linux 3.4 64-bit under VMware ESX; Intel Xeon E5-2430L (x86) without AES-NI w/ Linux 3.4 64-bit under Microsoft Hyper-V; Intel Xeon E5-2430L (x86) with AES-NI w/ Linux 3.4 64-bit under Microsoft Hyper-V; Apple A5 / ARM Cortex-A9 (ARMv7) without NEON w/ iOS 6.0; Apple A5 / ARM Cortex-A9 (ARMv7) with NEON w/ iOS 6.0; Intel Xeon E5-2430L (x86) with AES-NI w/ PexOS 1.0 on x86 under vSphere; Intel Xeon E5-2430L (x86) without AES-NI w/ PexOS 1.0 on x86 under vSphere | 5/31/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 08/06/13: Updated implementation information; |
2101 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Version 9.1.5 (Firmware) |
AMD Geode; Intel Celeron; Intel Pentium 4; Intel Xeon 7500; | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." 10/08/2014: Implementation version number changed |
2100 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Version 9.1.5 (Firmware) |
Intel Core i3-540; Intel Xeon 3400; Intel Xeon 5500; Intel Xeon 5600; Intel Pentium G6900 | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." 10/08/2014: Implementation version number changed |
2099 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 4.1 (Firmware) |
Intel Celeron; Intel Xeon | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2098 | Broadcom Corporation 5300 California Avenue Irvine, CA 92617 USA -James Montgomery
|
Part # XLP800/400 series Revision B2 |
N/A | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XLP800, XLP400 and XLP300 series of multi-core processors can deliver an unprecedented 160Gbps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro, edge and core infrastructure network applications." 04/15/15: Updated vendor information; |
2097 | Broadcom Corporation 5300 California Avenue Irvine, CA 92617 USA -Mark Litvack
|
Part # XLP800/400 series Revision B1 |
N/A | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XLP800, XLP400 and XLP300 series of multi-core processors can deliver an unprecedented 160Gbps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro, edge and core infrastructure network applications." |
2096 | Broadcom Corporation 5300 California Avenue Irvine, CA 92617 USA -James Montgomery
|
Part # XLP300 series Revision B1 |
N/A | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XLP800, XLP400 and XLP300 series of multi-core processors can deliver an unprecedented 160Gbps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro, edge and core infrastructure network applications." 04/16/15: Updated vendor information; |
2095 | Broadcom Corporation 5300 California Avenue Irvine, CA 92617 USA -Mark Litvack
|
Part # XLP300 series Revision B0 |
N/A | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The XLP800, XLP400 and XLP300 series of multi-core processors can deliver an unprecedented 160Gbps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro, edge and core infrastructure network applications." |
2094 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R6.6 (Firmware) |
ARM v5, Marvell's Feroceon processor Family; PowerPC, Freescale's PowerQUICC III Processor Family | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
2093 | Silicon Motion Technology Corp. 8F-1, No. 36, Taiyuan St. Jhubei City, Hsinchu County 30265 Taiwan -Cash Lo
|
Version 1.0 (Firmware) |
Cadence NC-verilog hardware simulator v10.20 | 5/24/2013 |
SHA-256 
(BYTE-only) "Silicon Motion Crypto Library is a hardware cryptographic library providing core cryptographic functionality for Silicon Motion security products which are capable to develop complex and flexible security applications." |
2092 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Boby Joseph
|
Version 7 |
RMI XLS408 dual-core,1000MHz,MIPS w/ ComwareV7 | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware V7 cryptographic library is a software library that provides cryptographic functions within HP devices." |
2091 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Part # CN1610-350BG233 |
N/A | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." |
2090 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-384 
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2089 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-256 
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2088 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-256 
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2087 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-256 
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2086 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-1     
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2085 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-1     
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2084 | whiteCryption Corporation 920 Stewart Drive Suite #100 Sunnyvale, CA 94085 USA -Alex Bessonov
|
Version 4.6.0 |
Nvidia Tegra 4 w/ Android 4.2 | 5/24/2013 |
SHA-1     
(BYTE-only) "whiteCryption Secure Key Box (SKB) is a C/C++ library that provides cryptographic algorithms. SKB''s unique white-box implementation is specifically designed to hide and protect cryptographic keys at all times. It allows safe deployment in insecure environments." |
2083 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 6.1.0.0.2 |
Intel Core 2 Quad (Intel 64 instruction set) w/ Microsoft Windows Server 2008 R2 | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "McAfee Network Security Manager (NSM) is the management console for McAfee Network Security Platform IPS. The NSM gives admins control and real-time data, so that they can manage, configure, and monitor NSP. The NSM Application Crypto Module provides cryptographic services for the Network Security Manager application." |
2082 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -James Reardon
|
Version 1.6 |
Intel Core 2 Quad (Intel 64 instruction set) w/ Microsoft Windows Server 2008 R2 | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "McAfee Network Security Manager (NSM) is the management console for McAfee Network Security Platform IPS. The NSM gives admins control and real-time data, so that they can manage, configure, and monitor NSP. The NSM Secure UI Crypto Module provides cryptography for serving the NSM console through a TLS session." |
2081 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Hiroshi Ito
|
Version FN001S (Firmware) |
Cortex-R4 | 5/24/2013 |
SHA-256 
(BYTE-only) "a library of unique software and hardware cipher solutions which are standard encryption algorithm-based to provide Toshiba mobile HDD products and the systems using them a robust and secure data storage environment" 04/24/14: Updated vendor information; |
2080 | Axway Inc. 2600 Bridge Parkway Suite 201 Redwood City, California 94065 USA -Prabhakar Mangam
-Anubhav Soni
|
Version 3.0 |
Intel Xeon E5-2620 w/ Microsoft Windows 2012 64bit; Intel Xeon E5-2620 w/ RHEL 6.3 64bit; Sun UltraSparc T1 w/ Solaris 10 64bit; | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Axway Validation Authority Suite - a collection of products that provide flexible and robust OCSP/SCVP certificate validation solution for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions." |
2079 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 4.1 |
Intel Xeon w/ McAfee Linux 2.2 running on VMware ESXi 5.0 | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
2078 | Certicom Corp. 4701 Tahoe Blvd. Building A Missisauga, ON L4W 0B5 Canada -Certicom Sales
|
Version 2.0.5 |
Intel Xeon X5650 w/ CentOS 5.4 Linux | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications." |
2077 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R6.6 (Firmware) |
PowerPC, Freescale's PowerQUICC III Processor Family; ARM v5, Marvell's Feroceon processor Family | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." 06/10/13: Updated implementation information; |
2076 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R6.6 (Firmware) |
PowerPC, Freescale's PowerQUICC III Processor Family; ARM v5, Marvell's Feroceon processor Family | 5/24/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." 06/10/13: Updated implementation information; |
2075 | Aviat Networks 5200 Great America Parkway Santa Clara, California 95054 USA -Ruth French
|
Version 7.7 (Firmware) |
Motorola MPC866 | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Eclipse Intelligent Node Unit (INUe). The module provides data security by encrypting the payload traffic on the microwave link between up to three radios. It also provides the Strong Encryption Suite for secure module management and uses AES encryption to secure SNMP v3 management traffic." |
2074 | Comtech EF Data Corporation 2114 West 7th Street Tempe, Arizona 85281 USA -Wallace Davis
|
Version 2.1.1 (Firmware) |
AMCC PowerPC 440EP | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "The Comtech EF Data FIPS Security Module features an FPGA to perform bulk encryption/decryption for Ethernet data traffic via Comtech Satellite Modems, as well as firmware to provide the cryptographic functions needed to act as a endpoint for TLS management and control traffic." |
2073 | N-Partner Technology Inc. 9F-B1, No.499, Zhongming S.Rd., West Dist. Taichung City, n/a 40347 Taiwan -Max Tsai
|
Version 1.0.0 |
Intel Xeon w/ Linux Kernel 2.6.30 64-bit | 5/10/2013 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "The N-Partner Cryptographic library is a software-based cryptographic module integrated into N-Reporter and N-Cloud Series Products. " |
2072 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 |
Xeon E Series w/ FortiOS | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "FortiGate virtual appliances offer protection from a broad array of threats, with support for all of the security and networking services offered by the FortiOS operating system." |
2071 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 |
Xeon E Series w/ FortiOS | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "FortiGate virtual appliances offer protection from a broad array of threats, with support for all of the security and networking services offered by the FortiOS operating system." |
2070 | HP 153 Taylor Street Littleton, MA 01460 USA -Boby Joseph
|
Version 5.2 |
Broadcom BCM5836,264MHz,MIPS w/ Comware V5.2; Freescale MPC8349,553MHz,PowerPC w/ Comware V5.2; Freescale MPC8544,667MHz,PowerPC w/ Comware V5.2; RMI(Netlogic) XLS408,1GHz,MIPS w/ Comware V5.2; Broadcom BCM112x,600MHz,MIPS w/ Comware V5.2 | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
2069 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SecOpenSSL2.0.3 |
ARMv7 w/ Android Jelly Bean 4.2 | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography. Salt length 0, 1 and 2 has been tested for RSASSA-PSS." 01/16/14: Updated implementation information; |
2068 | Authora, Inc. 1319 Dexter Ave. N., Suite 010 Seattle, WA 98109 USA -Tia Walker
|
Version 1.0 |
Intel Core w/ Windows Server 2008 | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Authora Cryptographic Algorithm Implementation implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation. It is used by a family of Authora products including Authora Edge and Zendit." |
2067 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SBC1.45_2.1 |
ARMv7 w/ Android Jelly Bean 4.2 | 5/10/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Java-based Bouncycastle used by Samsung devices to provide secure cryptography. Salt length 0, 1 and 2 has been tested for RSASSA-PSS." 08/28/13: Updated implementation information; |
2066 | Oracle America, Inc. 500 Oracle Parkway Redwood City, CA 94065 United States -Linda Gallops
|
Version 2.1 (Firmware) |
ARM 962EJS | 5/10/2013 |
SHA-1     
(BYTE-only) "The Oracle StorageTek T10000C Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. It delivers the world’s fastest write speeds to a native 5 TB of magnetic tape storage; making it ideal for data center operations with growing data volume." |
2065 | Oracle America, Inc. 500 Oracle Parkway Redwood City, CA 94065 United States -Linda Gallops
|
Version 2.1 (Firmware) |
ARM 962EJS | 5/10/2013 |
SHA-1     
(BYTE-only) "The Oracle StorageTek T10000C Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. It delivers the world’s fastest write speeds to a native 5 TB of magnetic tape storage; making it ideal for data center operations with growing data volume." |
2064 | N/A | N/A | N/A | 5/10/2013 | N/A |
2063 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP6 |
N/A | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiASIC CP6 Cryptographic Library v5.0 running on Intel x86 compatible processors." |
2062 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 (Firmware) |
Intel Celeron | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS SSL Cryptographic Library v5.0 running on Intel x86 and ARM compatible processors." |
2061 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 5.0 (Firmware) |
FortiOS | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the software implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.0 running on Intel x86 and ARM compatible processors." |
2060 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -John Bordwine
|
Version 1.0 |
Intel i5 w/ Microsoft Windows 7 32-bit; Intel i5 w/ Microsoft Windows Server 2008 R2 64-bit; Intel i5 w/ Apple Mac OS X 10.7 64-bit; Intel i5 w/ Apple Mac OS X 10.7 32-bit | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic engine for Symantec DLP" |
2059 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R6.6 (Firmware) |
ARM v5, Marvell's Feroceon processor Family; PowerPC, Freescale's PowerQUICC III Processor Family | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." 06/10/13: Updated implementation information; |
2058 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R6.6 (Firmware) |
ARM v5, Marvell's Feroceon processor Family; PowerPC, Freescale's PowerQUICC III Processor Family | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." 06/10/13: Updated implementation information; |
2057 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Ashot Andreasyan
|
Version v1_0_1_0 (Firmware) |
Free Scale MPC-7457; Free Scale MPC-8568E | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The 1.0.1c crypto library is used for protecting security parameters and key exchange protocol messages; authenticating a user; generating cryptographic and key encryption keys in GGM8000 and s6000 transport gateways." 08/27/13: Updated implementation information; |
2056 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.4 |
MIPS 24Kc w/ OpenWRT 2.6 | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." |
2055 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version KM1.3 |
ARMv7 w/ Android Jelly Bean 4.2 | 4/30/2013 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." 11/14/13: Updated implementation information; |
2054 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Kyung-Hee Lee
|
Version SCK1.4.1.2 |
ARMv7 w/ Android Jelly Bean 4.2 | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." |
2053 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA |
Version 12.1 |
Cavium Octeon CN5020 w/ JUNOS 12.1X44-D15.5-Domestic (SRX100); Cavium Octeon CN5020 w/ JUNOS 12.1X44-D15.5-FIPS (SRX100); Cavium Octeon CN5230 w/ JUNOS 12.1X44- D15.5-Domestic (SRX240); Cavium Octeon CN5230 w/ JUNOS 12.1X44- D15.5-FIPS (SRX240); Cavium Octeon CN6335 w/JUNOS 12.1X44- D15.5-Domestic (SRX550); Cavium Octeon CN6335 w/ JUNOS 12.1X44- D15.5-FIPS (SRX550); Cavium Octeon CN5645 w/ JUNOS 12.1X44- D15.5-Domestic (SRX650); Cavium Octeon CN5645 w/ JUNOS 12.1X44- D15.5-FIPS (SRX650); Motorola MPC8544E, PowerQUIC III Processor w/ JUNOS 12.1X44- D15.5-Domestic (SRX1400); Motorola MPC8544E, PowerQUIC III Processor w/ JUNOS 12.1X44- D15.5-FIPS (SRX1400); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-Domestic (SRX5000 with SPC-2); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-FIPS (SRX5000 with SPC-2); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-Domestic (SRX5000 with SPC-4); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-FIPS (SRX5000 with SPC-4); | 4/30/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks, Inc. JUNOS 12.1 X44 for SRX Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy." 09/10/13: Updated implementation information; |
2052 | Netronome Systems, Inc. 3159 Unionville Drive Suite 100 Cranberry Twp, PA 16066 USA -David Wells
-Roelof du Toit
|
Version 3.5.2 Part # SI-10000 |
SI-10000 has two Intel E5620 quad core CPUs and 24GB of memory. w/ Linux x86_64 | 4/23/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The SSL Inspector is a transparent SSL proxy designed to detect SSL traffic and then under policy control to "inspect" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text data and then passing this data to an associated security appliance that needs to see decrypted traffic." |
2051 | IBM 9032 South Rita Road Tucson, AZ 85744 USA -Christine Knibloe
|
Version P/N: 35P2401 (Firmware) |
PPC 405 | 4/23/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM TS1140." |
2050 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 2.10 |
Marvell 88PA6170C1 (ARMv7 dual core) w/ Lexmark Linux v3.0.0 | 4/23/2013 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto Module (user/kernel) provides cryptographic services to the firmware in Lexmark products." |
2049 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 2.10 |
Marvell 88PA6170C1 (ARMv7 dual core) w/ Lexmark Linux v3.0.0 | 4/23/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto Module (user/kernel) provides cryptographic services to the firmware in Lexmark products." |
2048 | Motorola Solutions, Inc. 6480 Via Del Oro San Jose, CA 95119 USA -Udayan Borkar
-Colin Cooper
|
Version 1.2.3 (Firmware) |
Cavium Octeon Plus CN5000 Family | 4/12/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "OpenSSL is a third party open source code, which provides cryptographic services to user space daemons. The device uses openssl-fips-1.2.3 version. Wing5 userspace daemons (RADIUS, ntp, openssh, rim, net-snmp, mapsh, etc) using openssl crypto services call fips_mode_set() from their respective initialization functions." |
2047 | Hewlett–Packard Development Company, L.P. 3000 Hanover Street Palo Alto, CA 94304-1185 USA -Mihai Damian
-Sameer Popli
|
Version 0.3 |
Intel(R) Xeon(R) E5-2658 w/ Debian Linux HPTE Version 5.0.0 | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Hewlett-Packard''s NonStop platform is used in complex computing environments, where business-critical applications need 24 x 7 availability, extreme scalability, and fault-tolerance. NonStop plays an important role in major industries and markets, including finance, healthcare, telecommunications, manufacturing, retail, and government." |
2046 | Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA 94105 USA -Joe Tomasello
-Andy Pang
|
Version 1.0 |
Intel Xeon (x86-64) w/ RiOS 8.0 32-bit; Intel Xeon (x86-64) w/ RiOS 8.0 64-bit; Intel Xeon E3-1220v2 (x86_64) w/ RiOS 8.0 64-bit running on VMware ESXi 5.1; Intel Xeon E3-1220v2 (x86_64) w/ AES-NI w/ RiOS 8.0 64-bit running on VMware ESXi 5.1; Intel Xeon E3-1220v2 (x86_64) w/ Stingray OS 4.0 running on VMware ESXi 5.1; Intel Xeon E3-1220v2 (x86_64) w/ AES-NI w/ Stingray OS 4.0 running on VMware ESXi 5.1; Intel Xeon E31220 (x86_64) w/ AES-NI w/ RiOS 8.0 64-bit; AMD Opteron 4122 (x86_64) w/ Granite OS 2.0; Intel Xeon E31220 (x86_64) w/ Granite OS 2.0 on VMware ESXi 5.1; Intel Xeon E31220 (x86_64) w /AES-NI w/ Granite OS 2.0 on VMware ESXi 5.1; Intel Xeon E5620 w/ Whitewater OS 3.0; Intel Xeon E5620 with AES-NI w/ Whit; ewater OS 3.0; Intel Xeon E31220 (x86) w/ Whitewater OS 3.0 under VMware ESXi 5.1; Intel Xeon E31220 (x86) with AES-NI w/ Whitewater OS 3.0 under VMware ESXi 5.1; AMD Opteron 2376 w/ Interceptor OS 4.5 ;  Intel Xeon E31220 w/ RiOS 8.6 32-bit; Intel Xeon E31220 w/ RiOS 8.6 64-bit; Intel Xeon E5-2430L w/ RiOS 8.6 64-bit under VMware ESXi 5.1; Intel Xeon E5-2430L with AES-NI w/ RiOS 8.6 64-bit under VMware ESXi 5.1; Intel Xeon E31220 with AES-NI w/ RiOS 8.6 64-bit; Intel Xeon w/ Steelhead Mobile Controller 4.6; Intel Xeon with AES-NI w/ Steelhead Mobile Controller 4.6; Intel Xeon E5-2430L w/ Steelhead Mobile Controller 4.6 under VMware ESXi 5.1; Intel Xeon E5-2430L with AES-NI w/ Steelhead Mobile Controller 4.6 under VMware ESXi 5.1 | 4/12/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Riverbed Cryptographic Security Module provides the cryptographic functionality for a variety of Riverbed''s platforms including Steelhead and Granite appliances. These network appliances deliver a scalable Wide Area Data Services (WDS) solution, transparently and securely optimizing performance across an enterprise network" 08/28/13: Added new tested information; |
2045 | Cummings Engineering Consultants, Inc. 145 S. 79th St., Suite 26 Chandler, AZ 85226 USA -Darren Cummings
|
Version 1.1 |
ARM Cortex A8 (ARMv7) w/ Apple iOS 5.0; Intel Core i7-3615QM w/ Apple OS X 10.7 | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic module used by the Cummings Engineering suite of products which allow for efficient and effective deployment of robust secure communications capability on commercial off the shelf (COTS) devices, such as Smartphones and Tablets, as well as speciality communications devices." |
2044 | SAP AG Albert-Einstein-Allee 3 Bensheim, NRW 64625 Germany -Stephan André
-Thomas Rothe
|
Version 2.0.0.1.32 32/64-bit |
Intel Xeon w/ Mac OS X 10.7 64-bit | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP NW SSO 2.0 Secure Login Library Crypto Kernel v2.0.0.1.32 is a shared library, i.e. it consists of software only. SAP NW SSO 2.0 Secure Login Library Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
2043 | SAP AG Albert-Einstein-Allee 3 Bensheim, NRW 64625 Germany -Stephan André
-Thomas Rothe
|
Version 2.0.0.1.32 64-bit |
Intel Xeon with AES-NI w/ Linux 2.6.32; AMD Opteron w/ Linux 2.6.32; IBM POWER7 (PowerPC) w/ Linux 2.6.32 on hypervisor VMware ESX 5.0.0; AMD Opteron w/ Linux 2.6.16; IBM S/390 (2817) w/ Linux 2.6.5 on hypervisor VMware ESX 4.1.0; IBM POWER6 (PowerPC) w/ Linux 2.6.16 on hypervisor VMware ESX 4.1.0; AMD Opteron w/ Linux 2.6.5; IBM S/390 (2817) w/ Linux 2.6.5 on hypervisor VMware ESX 4.1.0; IBM POWER5 (PowerPC) w/ Linux 2.6.5 on hypervisor VMware ESX 5.0.0; Intel Itanium 2 w/ Linux 2.6.5; Intel Itanium 2 w/ Linux 2.4.19; Intel Xeon w/ Solaris 5.10 64-bit; SPARC64 V w/ Solaris 5.10 64-bit; UltraSPARC III+ w/ Solaris 5.9 64-bit; SPARC64 III w/ Solaris 5.8 64-bit; Alpha 21264B (EV6) w/ True64 Unix 5.1; Intel Xeon w/ Mac OS X 10.7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 64-bit; AMD Opteron w/ Windows Server 2008 R2 on hypervisor VMware ESX 4.1.0; HP 9000/800/rp3440 (PA-RISC2.0) w/ HP-UX 11.31 64-bit; Intel Itanium 2 w/ HP-UX 11.31 64-bit; Intel Itanium 2 w/ HP-UX 11.23 64-bit; HP 9000/800/L3000-7x (PA-RISC2.0) w/ HP-UX 11.11 64-bit; HP 9000/800/L3000-5x (PA-RISC2.0) w/ HP-UX 11.00 64-bit; IBM POWER7 (PowerPC) w/ AIX 6.1 64-bit on hypervisor VMware ESX 4.1.0; IBM POWER4 (PowerPC) w/ AIX 5.2 64-bit; IBM POWER4 (PowerPC) w/ AIX 5.1 64-bit | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP NW SSO 2.0 Secure Login Library Crypto Kernel v2.0.0.1.32 is a shared library, i.e. it consists of software only. SAP NW SSO 2.0 Secure Login Library Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
2042 | SAP AG Albert-Einstein-Allee 3 Bensheim, NRW 64625 Germany -Stephan André
-Thomas Rothe
|
Version 2.0.0.1.32 32-bit |
Intel Pentium III w/ Linux 2.6.27 on hypervisor VMware ESX 4.1.0; Intel Xeon with AES-NI w/ Linux 2.6.32; Intel Pentium III w/ Linux 2.6.5; Intel Xeon w/ Linux 2.4.21; Intel Xeon w/ Linux 2.4.18; Intel Xeon w/ Solaris 5.10 64-bit; SPARC64 V w/ Solaris 5.10 64-bit; UltraSPARC III+ w/ Solaris 5.9 64-bit; SPARC64 III w/ Solaris 5.8 64-bit; Intel Xeon w/ Mac OS X 10.7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 64-bit; AMD Opteron w/ Windows Server 2008 R2 on hypervisor VMware ESX 4.1.0; HP 9000/800/rp3440 (PA-RISC2.0) w/ HP-UX 11.31 64-bit; HP 9000/800/L3000-7x (PA-RISC2.0) w/ HP-UX 11.11 64-bit; HP 9000/800/L3000-5x (PA-RISC2.0) w/ HP-UX 11.00 64-bit; IBM POWER7 (PowerPC) w/ AIX 6.1 64-bit on hypervisor VMware ESX 4.1.0; IBM POWER4 (PowerPC) w/ AIX 5.2 64-bit; IBM POWER4 (PowerPC) w/ AIX 5.1 64-bit | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP NW SSO 2.0 Secure Login Library Crypto Kernel v2.0.0.1.32 is a shared library, i.e. it consists of software only. SAP NW SSO 2.0 Secure Login Library Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
2041 | IP Cores, Inc. 3731 Middlefield Rd Palo Alto, CA 94303 USA -Dmitri Varsanofiev
|
Version 1.6 |
Intel i7-2640M w/ Windows 7 Professional | 4/5/2013 |
SHA-256 
(BYTE-only) "A compact yet high-performance PKCS #1 v 1.5 / RSA-2048 / SHA-256 software implementation used as a part of the ROM firmware of embedded CPUs and other semiconductor products with safe boot features. Provided as object code and implemented as ROM firmware on the Xilinx Zynq®-7000 All Programmable SoCs. Includes the RSA key generation, signature generation and signature verification code. RSAVS-compatible test bench." 09/26/13: Updated implementation information; |
2040 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.1 |
x86 32bit w/ Vyatta 6.4 | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CoCo OpenSSL Crypto Module is an OpenSSL cryptographic library that provides cryptographic services to its calling applications." 03/31/14: Updated implementation information; |
2039 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.1 |
AMD Geode 32bit w/ Red Hat Enterprise Linux 6 | 4/5/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CoCo OpenSSL Crypto Module is an OpenSSL cryptographic library that provides cryptographic services to its calling applications." 04/30/13: Updated implementation information; |
2038 | Duo Security 617 Detroit St Ann Arbor, MI 48104 USA -Jon Oberheide
|
Version 1.0 |
Intel Xeon x86-64 w/ Linux CentOS 6 | 3/29/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Duo Crypto Library provides cryptographic services for Duo Security''s two-factor authentication and security solutions." |
2037 | HGST, Inc. 5601 Great Oaks Parkway San Jose, California 95119 US -Rajesh Kukreja
-Jithendra Bethur
|
Version SOCFWLIB-0015 (Firmware) |
ARM Cortex R4 | 3/29/2013 |
SHA-256 
(BYTE-only) "HGST SEDs implement TCG Storage specifications. They satisfy the performance & security requirements of demanding enterprise applications. Embedded FIPS 140-2 modules have hardware encryption, cryptographic erase, independently authorized data bands and authenticated, protected FW download." 10/21/13: Updated the implementation with new test; |
2036 | Toshiba Corporation Social Infrastructure Systems Company 1, Komukai, Toshiba-cho, Saiwai-ku Kawasaki, Kanagawa 212-8583 Japan -Hiroki Fukuoka
|
Version 1.0.0 |
Intel Core i7 w/ Windows 7 Professional 32-bit | 3/29/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BIT) SHA-512_256  (BIT) "TSBIC CryptoLib is a general-purpose library which ensures high security to the applications requiring standard cryptographic algorithms." |
2035 | Microsemi Corporation 1281 Win Hentschel Blvd West Lafayette, IN 47906 USA -Michael Mehlberg
-General Inquiries
|
Version 4.4 (Firmware) |
Mentor Graphics Modelsim PE 6.6 Revision: 2010.01 | 3/29/2013 |
SHA-224 
(BIT) SHA-256  (BIT) SHA-384  (BIT) SHA-512  (BIT) "Microsemi's SHA-2 and HMAC reusable IP core for ASICs and FPGAs is throughput optimized and supports any combination of SHA-2 algorithms, bit-length keys and messages, as well as "online algorithm" operation. This core is developed by cleared US citizens for Government/Defense systems." |
2034 | Xilinx, Inc. 2100 Logic Drive San Jose, CA 95124 USA -Jason Moore
|
Part # 7 Series and Zynq |
N/A | 3/29/2013 |
SHA-256 
(BIT) "A Verilog implementation that has been synthesized into our 7 Series and Zynq products. This implementation has been governed in our internal revision control system. This implementation can be simulated via a synopsys VCS simulation/testbench framework." 04/12/13: Updated implementation information; |
2033 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Version 11.6.5 (Firmware) |
Intel E3 | 3/22/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
2032 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # DH8910CC |
N/A | 3/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
2031 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
-Sunil Chitnis
|
Version BRCD-IP-CRYPTO-VER-2.0 (Firmware) |
Freescale MPC 7448, RISC, 1700 MHZ; Freescale MPC 7447, RISC, 1000 MHZ; Freescale MPC 8544, PowerQUICC III, 800 MHZ | 3/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Brocade cryptographic library implements crypto operations in software. The Brocade MLX Series is highly optimized for IP Ethernet deployments, providing symmetric scaling and industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." |
2030 | Feitian Technologies Co., Ltd Floor 17, Tower B, Huizhi Mansion, No.9 Xueqing Road Haidian, Beijing 100085 China -Tibi
-PENG Jie
|
Version 1.0.0 (Firmware) |
Infineon SLE78CLFX4000PM; Infineon SLE77CLFX2400PM; Infineon SLE78CLUFX5000PHM | 3/22/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "FEITIAN-FIPS-Cryptographic Library V1.0.0 implements AES, TDES, CMAC, TDES MAC, SHA1, SHA256, SHA512, DRBG, RSA, and KDF, and operates on Infineon SLE78CLFX4000PM for FEITIAN-FIPS-JCOS V1.0.0, which is smart card complied with Java Card 2.2.2 and Global Platform 2.2.1." 03/29/13: Updated implementation information; |
2029 | Comtech Mobile Datacom Corporation 20430 Century Boulevard Germantown, MD 20874 USA -Vladislav Grinchenko
-Ryon Coleman
|
Version 1.2 |
Intel x64 w/ Red Hat Enterprise Linux 6.3 on KVM version libvirt 0.9.10-21.e16_3.7 on Red Hat Enterprise Linus 6 | 3/22/2013 |
SHA-1     
(BYTE-only) "libcmscrypto is a library implemented in the Comtech Mobile Datacom Corp. products and provides the basic cryptographic functionality that includes Advanced Encryption Standard (AES) algorithm, Triple-DES, SHA1 message digest, HMAC SHA-1 Keyed-Hash message authentication code." 01/09/14: Updated implementation information; |
2028 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park, n/a 300 Taiwan, R.O.C. -Rachel Menda-Shabat
-Leonid Azriel
|
Part # FD5C37 |
N/A | 3/15/2013 |
SHA-1     
(BYTE-only) "Nuvoton TPM (Trusted Platform Module), a TCG 1.2 compliant security processor with embedded firmware" |
2027 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SBC1.45_2.0 |
ARM7 w/ Android Jelly Bean 4.1 | 3/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Java-based Bouncycastle used by Samsung devices to provide secure cryptography. Salt length 0, 1 and 2 has been tested for RSASSA-PSS." |
2026 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SecOpenSSL2.0.3 |
ARMv7 w/ Android Jelly Bean 4.1 | 3/8/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography. Salt length 0, 1 and 2 has been tested for RSASSA-PSS." 01/16/14: Updated implementation information; |
2025 | Haivision, Inc. 4445 Garand Montreal, Quebec H4R 2H9 Canada -Jean Dube
|
Version 2.1.1 |
ARM v5TEJ w/ Linux 2.6 | 2/26/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "OpenSSL FIPS Object Module 2.0 (CMVP Cert. #1747)" |
2024 | GoldKey Security Corporation 26900 E. Pink Hill Rd Independence, MO 64057 USA -GoldKey Sales & Customer Service
-Jon Thomas
|
Version 7.13 (Firmware) |
Arca2S | 2/21/2013 |
SHA-256 
(BYTE-only) "Cryptographic algorithm implementation for GoldKey Products" 03/18/13: Updated implementation information; |
2023 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tasha Castaneda
-YJ Kim
|
Part # CN6740/CN6750/CN6760/CN6860/CN6870/CN6880, -SCP and -AAP options Version #-Y22 |
N/A | 2/21/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Octeon II CN 6XXX family of multi-core MIPS64 processors targets datacenter, routers, switches, control plane, base stations, and UTM applications. Part numbers: CN6010 CN6020 CN6120 CN6130 CN6220 CN6230 CN6330 CN6335 CN6630 CN6635 CN6640 CN6645 CN6740 CN6750 CN6760 CN6860 CN6870 CN6880, all with -SCP and -AAP options." |
2022 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tasha Castaneda
-YJ Kim
|
Part # CN6630/CN6635/CN6640/CN6645, -SCP and -AAP options Version # -Y |
N/A | 2/21/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Octeon II CN 6XXX family of multi-core MIPS64 processors targets datacenter, routers, switches, control plane, base stations, and UTM applications. Part numbers: CN6010 CN6020 CN6120 CN6130 CN6220 CN6230 CN6330 CN6335 CN6630 CN6635 CN6640 CN6645 CN6740 CN6750 CN6760 CN6860 CN6870 CN6880, all with -SCP and -AAP options." |
2021 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tasha Castaneda
-YJ Kim
|
Part # CN6010/CN6020/CN6120/CN6130, -SCP and -AAP options |
N/A | 2/21/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Octeon II CN 6XXX family of multi-core MIPS64 processors targets datacenter, routers, switches, control plane, base stations, and UTM applications. Part numbers: CN6010 CN6020 CN6120 CN6130 CN6220 CN6230 CN6330 CN6335 CN6630 CN6635 CN6640 CN6645 CN6740 CN6750 CN6760 CN6860 CN6870 CN6880, all with -SCP and -AAP options." |
2020 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Tasha Castaneda
-YJ Kim
|
Part # CN6220/CN6230/CN6330/CN6335, -SCP and -AAP options Version # -Y |
N/A | 2/19/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Octeon II CN 6XXX family of multi-core MIPS64 processors targets datacenter, routers, switches, control plane, base stations, and UTM applications. Part numbers: CN6010 CN6020 CN6120 CN6130 CN6220 CN6230 CN6330 CN6335 CN6630 CN6635 CN6640 CN6645 CN6740 CN6750 CN6760 CN6860 CN6870 CN6880, all with -SCP and -AAP options." |
2019 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.3 |
Freescale i.MX53xA (ARMv7) with NEON w/ Windows Embedded Compact 7; Freescale i.MX53xD (ARMv7) with NEON w/ Windows Embedded Compact 7; Qualcomm Snapdragon APQ8060 (ARMv7) with NEON w/ Android 4.0 | 2/19/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 02/21/13: Added new tested information; |
2018 | Advance Computing and Engineering Solutions. (ACES) H. No. 156, St 5, F11-1 Islamabad, n/a 44000 Pakistan -Dr. Mehreen Afzal
-Dr. Mureed Hussain
|
Version 2.1.1 |
DELL PowerEdge T110 II 11th Generation Server w/ RHEL 5.3 evaluated at EAL4+ | 2/19/2013 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "TPCL (Tahir Pak Crypto Library) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)." 03/12/13: Updated implementation information; |
2017 | CipherCloud, Inc. 99 Almaden Blvd., Suite 720 San Jose, CA 95113 USA -Varun Badhwar
|
Version 1.0 |
Intel Xeon E5645 w/ CentOS 6.3 with Java JRE 1.6.0 | 2/19/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The CipherCloud Encryption gateway provides FIPS approved cryptographic algorithms to protect sensitive data stored in public cloud environments, while preserving advanced operations such as searching, sorting and reporting." 07/12/13: Updated implementation information; |
2016 | Kony, Inc. 7380 West Sand Lake Rd. #390 Orlando, FL 32819 USA -Matthew Terry
|
Version 2.0 |
Qualcomm QSD 8250 (ARMv7) w/ Android 2.2; Qualcomm QSD 8250 (ARMv7) with NEON w/ Android 2.2; TI OMAP 3621 (ARMv7) w/ Android 3.0; TI OMAP 3621 (ARMv7) with NEON w/ Android 3.0; TI DM3730 (ARMv7) w/ Android 4.0; TI DM3730 (ARMv7) with NEON w/ Android 4.0; ARM Cortex-A8 (ARMv7) with NEON w/ Apple iOS 5.0; ARMv7 Cortex-A8 (ARMv7) with NEON w/ Apple iOS 6.0; ARM Cortex-A8 (ARMv7) without NEON w/ Apple iOS 5.0; ARM Cortex-A8 (ARMv7) without NEON w/ Apple iOS 6.0 | 2/19/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Kony Cryptographic Library v2.0 is a full featured cryptographic module used in Kony mobile and multi-channel application platforms and the KonyOne Platform." 08/09/13: Added new tested information; |
2015 | Atmel Corporation 2325 Orchard Parkway San Jose, CA 95131 US -Jim Hallman
-Todd Slack
|
Part # AT97SC3204-X4 |
N/A | 1/31/2013 |
SHA-1     
(BYTE-only) "The AT97SC3204 is a single chip cryptographic module used for cryptographic key generation, key storage and key management as well as generation and secure storage for digital certificates." 04/03/14: Updated vendor information; |
2014 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Palani Karuppan
|
Version OPENSSL-0.9.8g-7.0.0 (Firmware) |
Cavium Octeon Plus 5600 Family | 1/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." 02/07/13: Updated vendor information; |
2013 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Part # CNN3550 |
N/A | 1/31/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 10/25/13: Added new tested information; |
2012 | Tait Limited 558 Wairakei Road Burnside PO Box 1645 Christchurch, Christchurch 8053 New Zealand -Gordon Martin
-Wei Li Jiang
|
Version 2.0 (Firmware) |
Texas Instruments TMS320C5505 | 1/31/2013 |
SHA-1     
(BYTE-only) "Firmware implementation of the FIPS 140-2 certified Crypto Module, used to provide security features in the Tait Communications range of digital radios and base station equipment." 02/05/13: Updated implementation information; |
2011 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # Freescale SC1023 |
N/A | 1/31/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
2010 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # AMCC 460EXr |
N/A | 1/31/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
2009 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # AMCC 405EX |
N/A | 1/31/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
2008 | Lancope, Inc. 3650 Brookside Parkway, Suite 400 Alpharetta, GA 30022 USA -Jason Anderson
|
Version 1.0 |
Intel Xeon E3 series w/ Stealthwatch v6.3; Intel Xeon E5 series w/ Stealthwatch v6.3 | 1/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Lancope SSH library protects sensitive management data as it is transmitted to a Lancope appliance, using encryption techniques to provide a persistent level of protection. The library provides encrypted management communications for Lancope''s Stealthwatch products." |
2007 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Jon Green
|
Version 6.1.4.1-FIPS (Firmware) |
Cavium Networks Octeon Plus CN5010 | 1/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Aruba''s single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
2006 | Lancope, Inc. 3650 Brookside Parkway, Suite 400 Alpharetta, GA 30022 USA |
Version 1.0 |
Intel Xeon E5 series w/ Stealthwatch v6.3; Intel Xeon E3 series w/ Stealthwatch v6.3 | 1/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Lancope Crypto-J library relies on the RSA BSAFE Crypto-J module to protect sensitive data as it is stored using encryption techniques to provide a persistent level of protection. The library provides encrypted management and internal communications for Lancope''s Stealthwatch products." |
2005 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 4.1.2-10.1.1 |
Dual Xeon QuadCore w/ Red Hat Enterprise Version 5 | 1/25/2013 |
SHA-1     
(BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use" |
2004 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 5.2.17 |
Dual Xeon QuadCore w/ Red Hat Enterprise Linux 5 | 1/25/2013 |
SHA-1     
(BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use" 06/28/13: Updated implementation information; |
2003 | Accellion, Inc. 1804 Embarcadero Road Suite 200 Palo Alto, Ca 94303 USA -Prateek Jain
|
Version 1.0.1c |
Dual Xeon QuadCore w/ Red Hat Enterprise Linux 5 | 1/25/2013 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Accellion Cryptographic Module is a key component of Accellion''s secure collaboration solution that enables enterprises to securely share and transfer files. Extensive tracking and reporting tools allow compliance with SOX, HIPAA, FDA and GLB regulations while providing enterprise grade security and ease of use" 02/26/13: Updated and added new tested implementation information; |
2002 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version IOS 15.2(2)JA |
Freescale SC1023, 800Mhz, PPC w/ IOS 15.2(2)JA | 1/25/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
2001 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version IOS 15.2(2)JA |
AMCC 460EXr, 667MHz, PPC w/ IOS 15.2(2)JA | 1/25/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
2000 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version IOS 15.2(2)JA |
AMCC 405EX, 586MHz, PPC w/ IOS 15.2(2)JA | 1/25/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
1999 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version IOS 12.4(25e)JA |
IBM PPC405EP, 262 MHz, PPC w/ IOS 12.4(25e)JA | 1/25/2013 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
1998 | Cleversafe, Inc. 222 South Riverside Plaza Suite 1700 Chicago, Illinois 60606 US -Brenda Litin
-Jason Resch
|
Version dsaf-sdk-2.2.12370 |
Intel Xeon w/ Ubuntu 10 | 1/18/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This package contains the Dispersed Storage Access Framework (DSAF) Software Development Kit (SDK). It contains all of the documentation and libraries required to build applications that can store to and retrieve data from a simple object vault on a dsNet(TM) System." |
1997 | Allegro Software Development Corporation 1740 Massachusetts Avenue Boxborough, MA 01719 USA -Larry LaCasse
|
Version 1.1 |
Intel Core 2 Duo w/ Windows 7 Ultimate (64-bit) | 1/18/2013 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange" |
1996 | Oracle Corporation 4150 Network Circle Drive Santa Clara, CA 95054 US -Arjuna Baratham
-Mehdi Bonyadi
|
Version 1.1.7, 1.1.8 and 1.1.9 (Firmware) |
Intel 80333 | 1/7/2013 |
SHA-512 
(BYTE-only) "Hardware Security Module and Cryptographic Accelerator Card" |
1995 | Oracle Corporation 4150 Network Circle Drive Santa Clara, CA 95054 US -Arjuna Baratham
-Mehdi Bonyadi
|
Version 1.17, 1.1.8 and 1.1.9 (Firmware) Part # 375-3424, Rev. -02, -03, -04, -05, and -06 |
Intel 80333 | 1/7/2013 |
SHA-1     
(BYTE-only) "Hardware Security Module and Cryptographic Accelerator Card" |
1994 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Security Evaluations Manager
|
Part # 527-1437-01; 7043165 |
N/A | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oracle Solaris OS utilizes the Oracle Solaris Cryptographic Framework SHA implementation to provide SHA functionality when running on a SPARC T4 and SPARC T5 processor." 07/12/13: Added new tested information; |
1993 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Security Evaluations Manager
|
Version 1.0 |
SPARC64 w/ Oracle Solaris 11.1; Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oracle Solaris OS utilizes the Oracle Solaris Kernel Cryptographic Framework module to provide cryptographic functionality for any kernel-level processes that require it, via Oracle-proprietary APIs." 08/12/13: Added new tested information; |
1992 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Security Evaluations Manager
|
Version 1.0 |
SPARC64 w/ Oracle Solaris 11.1; Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for applications running in user space. It exposes three public interfaces to provide cryptography to any application designed to utilize them." 08/12/13: Added new tested information; |
1991 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3 |
Intel Xeon w/ SecureOS 8.3 running on Crossbeam XOS v9.9.0; Intel Xeon w/ SecureOS 8.3 running on VMware ESXi v5.0 | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Firewall Enterprise 64-Bit Cryptographic Engine is a software library that provides cryptographic services for applications on the virtual deployments of McAfee''s Firewall Enterprise appliance." |
1990 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3 (Firmware) |
Intel Atom; Intel Core i3; Intel Pentium; Intel Xeon | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Firewall Enterprise 64-bit Cryptographic Engine is a firmware library that provides cryptographic services for applications across several versions of the McAfee Firewall Enterprise Appliances." |
1989 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3 |
Intel Xeon w/ SecureOS 8.3 running on VMware ESXi v5.0; Intel Xeon w/ SecureOS 8.3 running on Crossbeam XOS v9.9.0 | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Firewall Enterprise 32-Bit Cryptographic Engine is a software library that provides cryptographic services for applications on the virtual deployments of McAfee''s Firewall Enterprise appliance." |
1988 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.3 (Firmware) |
Intel Atom; Intel Core i3; Intel Pentium; Intel Xeon | 12/31/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Firewall Enterprise 32-bit Cryptographic Engine is a firmware library that provides cryptographic services for applications across several versions of the McAfee Firewall Enterprise Appliances." |
1987 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Version 1.0 |
Intel Xeon w/ Redhat Enterprise Linux 5 running on KVM 0.14; Intel Xeon w/ Redhat Enterprise Linux 5 running on VMWare ESXi 4.0; Intel Xeon w/ Redhat Enterprise Linux 5 running on Citrix XenServer 6.0 | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SoftAX, part of A10 Networks'' award-winning AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure." |
1986 | A10 Networks, Inc. 3 West Plumeria Drive San Jose, CA 95134 USA -John Chiong
|
Version 1.0 |
Intel Xeon w/ Redhat Enterprise Linux 5 running on KVM 0.14; Intel Xeon w/ Redhat Enterprise Linux 5 running on VMWare ESXi 4.0; Intel Xeon w/ Redhat Enterprise Linux 5 running on Citrix XenServer 6.0 | 12/21/2012 |
SHA-1     
(BYTE-only) "SoftAX, part of A10 Networks'' award-winning AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure." |
1985 | Rockwell Collins, Inc. 400 Collins Road, MS 183-100 Cedar Rapids, IA 52411 USA -Ed Tubbs
-Ron Phister
|
Version 811-6928-001 |
Rockwell Collins Advanced Architecture MicroProcessor 7 Government Microprocessor (AAMP7G) w/ Embedded code | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "MicroTurnstile is a tactical dismounted soldier wearable bi-directional transfer Cross Domain Solution cabled between the SECRET System High Nett Warrior network and the UNCLASSIFED Rifleman Radio network. Its purpose is to transfer Position Location Information, along with other selected messages, between the two networks." |
1984 | N/A | N/A | N/A | 12/21/2012 | N/A |
1983 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.0 |
Intel x86 32bit w/ Vyatta 6.4 | 12/21/2012 |
SHA-1     
(BYTE-only) "The algorithms are used for CoCo Cryptographic Module integrity check." |
1982 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.0 |
AMD Geode 32bit w/ Linux kernel 2.6 | 12/21/2012 |
SHA-1     
(BYTE-only) "The algorithms are used for CoCo Cryptographic Module integrity check." |
1981 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.0 |
Intel x86 32bit w/ Vyatta 6.4 | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CoCo Cryptographic Module is a Linux loadable kernel module that provides cryptographic services in the Linux kernel. It provides an API that can be used by other kernel services." |
1980 | CoCo Communications 800 5th Ave Seattle, WA 98104 USA -David Weidenkopf
|
Version 2.0 |
AMD Geode 32bit w/ Linux kernel 2.6 | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CoCo Cryptographic Module is a Linux loadable kernel module that provides cryptographic services in the Linux kernel. It provides an API that can be used by other kernel services." |
1979 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Luis Luciani
|
Version 1.5 (Firmware) |
iLO 3 GLP (ASIC) with ARM-926; iLO 3 GXE (ASIC) with ARM-926 | 12/21/2012 |
SHA-1     
(BYTE-only) "HP Integrated Lights-Out (iLO) management built into BladeSystem blade servers and storage blades is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall “health”, reports issues, and provides a means for setup and managing of power and thermal settings." |
1978 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Luis Luciani
|
Version 1.5 (Firmware) |
iLO 3 GLP (ASIC) with ARM-926; iLO 3 GXE (ASIC) with ARM-926 w/ Green Hills Integrity RTOS | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HP Integrated Lights-Out (iLO) management built into BladeSystem blade servers and storage blades is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall “health”, reports issues, and provides a means for setup and managing of power and thermal settings." |
1977 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Luis Luciani
|
Version 1.5 (Firmware) |
iLO 3 GLP (ASIC) with ARM-926; iLO 3 GLP (ASIC) with ARM-926 w/ Green Hills Integrity RTOS; | 12/21/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "HP Integrated Lights-Out (iLO) management built into BladeSystem blade servers and storage blades is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall “health”, reports issues, and provides a means for setup and managing of power and thermal settings." |
1976 | Uplogix, Inc. 7600 B North Capital of Texas Highway Suite 220 Austin, TX 78731 USA -Martta Howard
|
Version 3.12.11 (Firmware) |
AMD Geode LX; Intel Celeron D; Intel Atom E6xx | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Uplogix Local Managers utilize Mozilla''s Network Security Services for general purpose cryptographic functionality. NSS provides the algorithms necessary to secure Uplogix'' SSH and TLS implementations. See http://www.uplogix.com" |
1975 | Uplogix, Inc. 7600 B North Capital of Texas Highway Suite 220 Austin, TX 78731 USA -Martta Howard
|
Version 1.4.4 (Firmware) |
AMD Geode LX; Intel Atom E6xx; Intel Celeron D | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Uplogix Local Managers utilize Libgcrypt to provide cryptographic algorithms to connect to IPSec VPNs. See http://www.uplogix.com and http://www.gnupg.org/ for more information." |
1974 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -Mocana Sales
|
Version 5.5fi |
FreeScale QorIQ P2 w/ VxWorks 6.8 | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Loadable Kernel Module (Software Version 5.5fi) is a hybrid, multi-chip standalone cryptographic module that runs on a general purpose computer. The primary purpose of this module is to provide FIPS Approved cryptographic routines to consuming applications via an Application Programming Interface." |
1973 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Tim McDonough
-Manny Novoa
|
Version 3.71 (Firmware) |
PowerPC 440EPX processors | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
1972 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Tim McDonough
-Manny Novoa
|
Version 3.71 (Firmware) |
PowerPC 440EPX processors | 12/21/2012 |
SHA-1     
(BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
1971 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 6.0 (Firmware) |
Intel® Pentium Dual-Core | 12/21/2012 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
1970 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 6.0 (Firmware) |
Intel® Pentium Dual-Core | 12/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
1969 | Comtech Mobile Datacom Corporation 20430 Century Boulevard Germantown, MD 20874 USA -Vladislav Grinchenko
-Ryon Coleman
|
Version 1.2 |
Intel x64 w/ Red Hat Enterprise Linux 6.2 | 12/7/2012 |
SHA-1     
(BYTE-only) "libcmscrypto is a library implemented in the Comtech Mobile Datacom Corp. products and provides the basic cryptographic functionality that includes Advanced Encryption Standard (AES) algorithm, Triple-DES, SHA1 message digest, HMAC SHA-1 Keyed-Hash message authentication code." |
1968 | Motorola Mobility, LLC 600 North U.S. Highway 45 Libertyville, Illinois 60048 USA -Fernando Nascimento
-Wesley Ribeiro
|
Version 1.0 |
Qualcomm Snapdragon S4 (ARMv7) w/ Android 4.1.2; Qualcomm Snapdragon S4 (ARMv7) w/ Android 4.2.2; ARMv7 Qualcomm MSM8226 w/ Android 4.3; ARMv7 Qualcomm MSM8960DT w/ Android 4.4 ;  Qualcomm Snapdragon MSM8084 (ARMv7) w/ Android 5.0.2 | 12/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Motorola Mobility Linux Kernel Software Cryptographic Module is a software only cryptographic module which provides general purpose cryptographic services (AES, Triple DES, SHA, HMAC and RNG) to Linux kernel space software (i.e., the kernel itself, kernel extensions and device drivers) for Android mobile devices." 03/26/13: Updated and added new tested information; |
1967 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
|
Version 1.0 |
Intel Xeon E3-1220v2 w/ AES-NI w/ Windows Server 2008R2 64-bit; Intel Xeon E3-1220v2 w/ Windows Server 2008 64-bit; Intel Core i5-2430M w/ AES-NI w/ Windows 7 64-bit; Intel Core i5-2430M w/ Windows 7 32-bit; Intel Xeon E3-1220v2 w/ AES-NI w/ NetBSD 4.1 32-bit on VMware ESX; ARMv7 w/ NEON w/ Android 4.0; Intel Xeon E3-1220v2 w/ AES-NI w/ RHEL 6.2 64-bit; Intel Xeon 3050 w/ CentOS 5.6 32-bit | 12/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet Software Cryptographic Library is SafeNet’s cryptographic service provider that provides extended high performance cryptographic services for SafeNet''s broad range of Data Protection products." |
1966 | Brocade Communication Systems, Inc. 120 Holger Way San Jose, CA 95110 USA -Vidya Sagar Ravipati
|
Version FIPS OpenSSL 1.0 (Firmware) Part # Freescale e500mc |
Freescale e500mc | 11/30/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Brocade FIPS Crypto Library, NOS" |
1965 | Brocade Communication Systems, Inc. 120 Holger Way San Jose, CA 95110 USA -Vidya Sagar Ravipati
|
Version FIPS OpenSSL 1.0 (Firmware) Part # Freescale e500v2 |
Freescale e500v2 | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Brocade FIPS Crypto Library, NOS" |
1964 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Laurie Smith
|
Version 6.3.1 (Firmware) |
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor." |
1963 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 (Firmware) |
Intel 2x Xeon; Intel Celeron; Intel Core i3; Intel Xeon | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway Agent v1.0 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." |
1962 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 |
Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v4.1; Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v5.0; | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway Agent v1.0 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." |
1961 | N/A | N/A | N/A | 11/21/2012 | N/A |
1960 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # FortiASIC CP8 |
N/A | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the hardware implementation of the Fortinet FortiASIC CP8 Cryptographic Library v4.3.6 running on Intel x86 compatible processors." |
1959 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # FortiASIC CP7 |
N/A | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the hardware implementation of the Fortinet FortiASIC CP7 Cryptographic Library v4.3.6 running on Intel x86 compatible processors." |
1958 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP6 |
N/A | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the hardware implementation of the Fortinet FortiASIC CP6 Cryptographic Library v4.3.6 running on Intel x86 compatible processors." |
1957 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP4 |
N/A | 11/21/2012 |
SHA-1     
(BYTE-only) "This document focuses on the hardware implementation of the Fortinet FortiASIC CP4 Cryptographic Library v4.3.6 running on Intel x86 compatible processors." |
1956 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.3.6 (Firmware) |
Intel Xeon; Intel Tolopai; Intel i5-750 Quad Core; Intel i3-540 Dual Core; Intel Core 2 Duo; Intel Celeron; ARM v5 Compatible | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v4.0 MR3 running on Intel x86 compatible processors." |
1955 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.3.6 (Firmware) |
Intel Xeon; Intel Tolopai; Intel i5-750 Quad Core; Intel i3-540 Dual Core; Intel Core 2 Duo; Intel Celeron; ARM v5 Compatible | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v4.0 MR3 running on Intel x86 compatible processors." |
1954 | SafeLogic Inc 530 Lytton Ave, Ste 200 Palo Alto, CA 94301 USA |
Version 2.1 |
Intel i7 w/ CentOS 6.3; Intel i7 w/ Mac OS X 10.8; Intel i7 w/ RHEL 6.3; Intel i7 w/ SUSE Linux Enterprise 11 SP2; Intel i7 w/ Windows 2008 R2; PowerPC P2020 w/ CentOS 6.3; | 11/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CryptoComply | Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation." 01/16/14: Added new tested information; |
1953 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories No.99, Dianyan Rd. Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 2.2 (Firmware) |
Renesas RS45C | 11/15/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HiCOS PKI Native Smart Card supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, RSA 2048 encrypt/decrypt (including RSA-CRT), RSA digital signature generation /verification(including RSA-CRT) and APDU command/response encryption and/or MAC" |
1952 | Allegro Software Development Corporation 1740 Massachusetts Avenue Boxborough, MA 01719 USA -Larry LaCasse
|
Version 1.1 |
Dell Optiplex 775, Intel Core 2 Duo w/ Windows 7 Ultimate | 11/15/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange." |
1951 | Panzura, Inc. 22 Great Oaks Blvd #150 San Jose, CA 95119 USA -Rich Weber
|
Version 4.2 |
Intel Xeon E5620 (x86) with AES-NI w/ Panzura Cloud Controller 8.0; Intel Xeon E5620 (x86) with AES-NI w/ Panzura Cloud Controller 8.0 on VMware ESX; Intel Xeon E5620 (x86) w/ Panzura Cloud Controller 8.0 on VMware ESX | 11/15/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Panzura Cyrptographic Module provides validated cryptographic services for multiple Panzura products." |
1950 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Tim McDonough
-Manny Novoa
|
Version 3.7 (Firmware) |
PowerPC 440EPX processors | 11/15/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
1949 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Tim McDonough
-Manny Novoa
|
Version 3.7 (Firmware) |
PowerPC 440EPX processors | 11/15/2012 |
SHA-1     
(BYTE-only) "The module provides administrative control of HP BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure." |
1948 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Laurie Smith
|
Version 6.2.3 (Firmware) |
AMCC PowerPC 440EPx | 10/23/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor." 10/31/12: Updated implementation information; |
1947 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Jim Dickens
-Chris Brych
|
Part # SF914-35005-002A, v2.8.5 |
N/A | 10/23/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution." 10/31/12: Updated implementation information; |
1946 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Florence Defrance
-Arnaud Lotigier
|
Version 1.6 (Firmware) Part # IFX SLE78 (M7892 & M7820) chip family |
Infineon SLE78 (M7892 & M7820) chip family. | 10/23/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IDCore 30 Cryptographic Library v1.6 operates on the Infineon SLE78 (M7892 & M7820) chip family, targeting Javacard 2.2.2, GP 2.1.1 & GP 2.2 Amdt D compliant modules. The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH and ANSI X9.31 RNG algorithms." 10/31/12: Updated implementation information; |
1945 | Senetas Corporation Ltd. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Julian Fay
|
Version 0.98 (Firmware) |
Intel ATOM | 10/23/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Senetas Corporation''s CN6000 Series Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN6000 Series Encryptor. Based upon OpenSSL the CN6000 Series Crypto Library provides an Application Programming Interface (API) to support security relevant services." |
1944 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version KM1.1 |
ARMv7 Processor rev 0 (v7l) w/ Android Jelly Bean 4.1 | 10/23/2012 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." |
1943 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SCK1.4.1.1 |
ARMv7 Processor rev 0 (v7l) w/ Android Jelly Bean 4.1 | 10/23/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 01/17/13: Updated implementation information; |
1942 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 2.0 |
Intel Core i5-650 with AES-NI (x64) w/ Microsoft Windows 7; Intel Core i5-2520M with AES-NI (x64) w/ Mac OS X 10.7; Intel Xeon E5504 (x64) w/ FreeBSD 9.0; Intel Xeon E5649 with AES-NI (x64) w/ Linux 2.6; Cavium CN5230 (MIPS) (x64) w/ Linux 2.6; Snapdragon S3 APQ8060 (ARM) w/ Android 4.0; Freescale 8548 (PowerPC) w/ Linux 2.6; Apple A5X (ARM) w/ Apple iOS 5.1; ARMv7 w/ Android 4.0; PowerPC, Freescale's PowerQUICC III Processor Family w/ Linux 2.6 | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products." 07/03/13: Added new tested information; |
1941 | SafeNet, Inc. 100 Conifer Hill Dr Suite 505 Danvers,, MA 01923 US -Chris Brych
-Tim Ober
|
Version SEP v1.1.17 (Firmware) Part # Okemo RevA |
Tilera Pro64 | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "A 10G/1G NAS security device, providing encryption, key management, and authentication services for file based encryption in flight." |
1940 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
MPC8572E | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IOS-XE Firmware cryptographic implementations used within Cisco devices to provide cryptographic functions." |
1939 | Ultra Electronics 3eTI 9715 Key West Avenue, Suite 500 Rockville, MD 20850 USA -Harinder Sood
-Chris Guo
|
Version 1.0 (Firmware) |
Energy Micro EFM32 CPU | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Cryptographic algorithms for embedded sensor platform" |
1938 | RSA, the Security Division of EMC Level 11, 345 Queen Street Brisbane, Queensland 4000 Australia -Stefan Pingel
-Peter Robinson
|
Version 6.1 and 6.1.1.0.1 |
AMD Athlon 64 X2 Dual-Core Processor 3800+ w/ Microsoft Windows 7 (64-bit) with Sun JRE 7.0; Intel T7300 Core 2 Duo w/ Android 2.2 ARM (32-bit) JRE 6.0 | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) SHA-512_224  (BYTE-only) SHA-512_256  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." 11/22/13: Updated implementation information; |
1937 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 3.0.0.17 |
PowerPC 460 (32-bit) w/ Timesys Linux 2.6.26.8-rt16 | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
1936 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
-Sunil Chitnis
|
Version Brocade Ironware with NIFIPS05200_0222121200 (Firmware) |
Freescale MPC 7448 | 10/17/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Brocade cryptographic library implements crypto operations in software. The Brocade MLX Series is highly optimized for IP Ethernet deployments, providing symmetric scaling and industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." |
1935 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
-Sunil Chitnis
|
Version Brocade Ironware with NIFIPS05200_0222121200 (Firmware) |
Freescale MPC 7447 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Brocade cryptographic library implements crypto operations in software. The Brocade MLX Series is highly optimized for IP Ethernet deployments, providing symmetric scaling and industry-leading wire-speed port capacity without compromising the performance of advanced capabilities such as IPv6, MPLS, and MPLS Virtual Private Networks (VPNs)." |
1934 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
-Sunil Chitnis
|
Version Brocade Ironware with NIFIPS05200_0222121200 (Firmware) |
Freescale MPC 8544 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. Brocade® NetIron® CER 2000 Series routers allow service providers to save space, power, and cooling while extending wire-speed IP and Multi-Protocol Label Switching (MPLS) services to the network edge." |
1933 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Chris Marks
|
Version FIFIPS07400_1002121000 (Firmware) |
Feroceon 88FR131 rev1 (v5b) | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade crypotgraphic library used in Brocade IP products implements crypto operations in software. The Brocade One-strategy helps simplify networking infrastructures through innovative technologies and solutions." |
1932 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version SHA-256 FIPS Module Version 1 (Firmware) |
IBM PowerPC | 10/5/2012 |
SHA-256 
(BYTE-only) "Implements the SHA-256 algorithm used to hash user passwords." |
1931 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version EbemCrypto Version 9 (Firmware) |
IBM PowerPC | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "Implements authentication, key negotiation/generation, and controls FPGA implementation of traffic encryption in ViaSat''s Enhanced Bandwidth Efficient Modem (EBEM-500)." |
1930 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
-Jorma Levomäki
|
Version 1.1 |
Intel X3450 w/ GNU / Linux (Debian) 6.0 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Stonesoft Cryptographic Library is a software module that provides cryptographic services for Stonesoft network security products." 09/25/13: Updated implementation information; |
1929 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
-Jorma Levomäki
|
Version 1.1 |
Intel Atom 425 w/ GNU / Linux (Debian) 6.0 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Stonesoft Cryptographic Library is a software module that provides cryptographic services for Stonesoft network security products." 09/20/13: Updated implementation information; |
1928 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
-Jorma Levomäki
|
Version 1.0 |
Intel X3450 w/ GNU / Linux (Debian) 6.0 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Stonesoft Cryptographic Library is a software module that provides cryptographic services for Stonesoft network security products." |
1927 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
-Jorma Levomäki
|
Version 1.0 |
Intel Atom 425 w/ GNU / Linux (Debian) 6.0 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Stonesoft Cryptographic Library is a software module that provides cryptographic services for Stonesoft network security products." |
1926 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R3 (Firmware) Part # EX-3300 |
Marvell Feroceon ARM v5 w/ Junos 12.1R3; Freescale e500v2 Power PC w/ Junos 12.1R3 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1925 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R3 (Firmware) Part # EX-3300 |
Marvell Feroceon ARM v5 w/ Junos 12.1R3; Freescale e500v2 Power PC w/ Junos 12.1R3 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1924 | Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Junos 12.1R3 (Firmware) Part # EX-3300 |
Marvell Feroceon ARM v5 w/ Junos 12.1R3; Freescale e500v2 Power PC w/ Junos 12.1R3 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1923 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.2 |
PowerPC-e500 w/ NetBSD 5.1; Intel Xeon 5500 (x86-64) w/ NetBSD 5.1; Intel Xeon E3-1220v2 (x86) w/ RHEL 6 32-bit under vSphere; Intel Xeon E3-1220v2 (x86) w/ Windows 2008 32-bit under vSphere; Intel Xeon E3-1220v2 (x86) w/ RHEL 6 64-bit under vSphere; Intel Xeon E3-1220v2 (x86) w/ Windows 2008 64-bit under vSphere; Intel Core i5-2430M (x86) w/ Windows 7 64-bit with AES-NI; TI DM3730 (ARMv7) w/ Android 4.1; TI DM3730 (ARMv7) with NEON w/ Android 4.1; Nvidia Tegra 3 (ARMv7) w/ Android 4.2; Nvidia Tegra 3 (ARMv7) with NEON w/ Android 4.2; ARM Cortex A8 (ARMv7) with NEON w/ Apple iOS 5.0; Qualcomm MSM8X60 (ARMv7) with NEON w/ VMware Horizon Mobile 1.3 under VMware; Intel Core i7-3615QM w/ Apple OS X 10.7 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be dowloaded from www.openssl.org/source/." 12/31/12: Added new tested information; |
1922 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version JUNOS-FIPS 12.1R3 (Firmware) |
Freescale Power PC; Intel(R) Pentium(R) M; Intel Pentium III | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1921 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version JUNOS-FIPS 12.1R3 (Firmware) |
Freescale Power PC; Intel Pentium M; Intel Pentium III | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1920 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sundar Ram T S B
|
Version JUNOS-FIPS 12.1R3 (Firmware) |
Intel Pentium III; Intel Pentium M; Intel Pentium III | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1919 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
-James Reardon
|
Version 1.0 |
VMware ESXi 5.0 on Intel Xeon w/ Nitro OS 9.1 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee SIEM 64-bit Cryptographic Engine v1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of SIEM products including Nitro IPS." |
1918 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
-James Reardon
|
Version 1.0 |
Intel Xeon w/ Nitro OS 9.1 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee SIEM 64-bit Cryptographic Engine v1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of SIEM products including Nitro IPS." |
1917 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
-James Reardon
|
Version 1.0 |
Intel Xeon w/ Nitro OS 9.1 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee SIEM 32-bit Cryptographic Engine v1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of SIEM products including Nitro IPS." |
1916 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Andy Nissen
-James Reardon
|
Version 1.0 |
VMware ESXi 5.0 on Intel Xeon w/ Nitro OS 9.1 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee SIEM 32-bit Cryptographic Engine v1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of SIEM products including Nitro IPS." |
1915 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA -Joel Schuetze
-Min Cao
|
Version 1.0.0 Part # Intel® Communication Chipset 8920 |
Intel® Communications Chipset 89xx Series w/ Intel® Celeron® Processor 725C w/ Fedora 16 | 10/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Intel® Celeron® Processor 725C with Intel® Communications Chipset 89xx Series using Intel® QuickAssist Technology. The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms." 10/10/12: Updated implementation information; |
1914 | Vocera Communications, Inc. 525 Race Street San Jose, CA 95126 USA -Thirumalai Bhattar
-Arun Mirchandani
|
Version 2.0 |
Texas Instruments OMAP5912 w/ Vocera Embedded Linux v1.1 | 10/5/2012 |
SHA-1     
(BYTE-only) "The Wireless Communications Cryptographic Library provides cryptographic services to Vocera''s Communications Badge product. The Vocera Communications Badge is a wearable device that enables secure two-way voice conversation without the need to remember a phone number or use a handset." |
1913 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R11 (Firmware) Part # RE-S-2000 |
Intel(R) Pentium(R) M processor 2.00GHz (1995.01-MHz 686-class CPU) | 9/28/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1912 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R11 (Firmware) Part # RE-S-2000 |
Intel(R) Pentium(R) M processor 2.00GHz (1995.01-MHz 686-class CPU) | 9/28/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1911 | Apricorn, Inc. 12191 Kirham Rd Poway, CA 92064 USA -Robert Davidson
|
Version 4.0 (Firmware) Part # Apricorn APR26k22 |
Apricorn APR26k22 | 9/28/2012 |
SHA-256 
(BIT) "Micro Controller to USB 2.0/3.0 SATA bridge ASIC." 10/05/12: Updated implementation information; |
1910 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Main Office
-Victor Wolff
|
Version 1.2 (Firmware) |
Intel® Xeon | 9/28/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." |
1909 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R11 (Firmware) Part # RE-S-2000 |
Intel(R) Pentium(R) M processor 2.00GHz (1995.01-MHz 686-class CPU) | 9/26/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1908 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R11 (Firmware) Part # RE-S-2000 |
Intel(R) Pentium(R) M processor 2.00GHz (1995.01-MHz 686-class CPU) | 9/26/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1907 | Curtiss-Wright Controls Defense Solutions 333 Palladium Drive Kanata, ON K2V 1A6 CANADA -Aaron Frank
-Johan
|
Version 2.0 (Firmware) |
Freescale MPC8572E | 9/26/2012 |
SHA-1     
(BYTE-only) "The CWC Bootloader Cryptographic Algorithm Engine is used by CWC’s secure hardware to verify the integrity of the application firmware." |
1906 | Curtiss-Wright Controls Defense Solutions 333 Palladium Drive Kanata, ON K2V 1A6 CANADA -Aaron Frank
-Johan A Koppernaes
|
Version 2.0 (Firmware) |
Freescale MPC8572E | 9/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CWCDS Cryptographic Library provides crypto services to support IPSec/VPN and enhanced Ethernet network security and includes IKE, SSH, and TLS, using various cryptographic algorithms." |
1905 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenburg
|
Version 8.2.2.0 |
IBM zSeries z196 64-bit with CPACF hardware support w/ Red Hat Enterprise Linux Server 5 | 9/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 03/21/13: Updated implementation information; |
1904 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM zSeries z196 64-bit with CPACF hardware support w/ Red Hat Enterprise Linux Server 5 | 9/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 03/21/13: Updated implementation information; |
1903 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 6.2.9200 |
Qualcomm Snapdragon S4 w/ Windows RT (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Windows RT (ARMv7 Thumb-2); Intel Core i7 with AES-NI w/ Windows 8 Enterprise (x64); Intel Pentium D w/ Windows 8 Enterprise (x64); AMD Athlon 64 X2 Dual Core w/ Windows 8 Enterprise (x86); Intel Core i7 with AES-NI w/ Windows Server 2012 (x64); Intel Pentium D w/ Windows Server 2012 (x64); Qualcomm Snapdragon S4 w/ Windows Phone 8 (ARMv7 Thumb-2); Intel x64 Processor with AES-NI w/ Surface Windows 8 Pro (x64) ;  Intel Core i7 without AES-NI w/ Windows Storage Server 2012; Intel Core i7 with AES-NI w/ Windows Storage Server 2012 | 9/13/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Next Generation Cryptographic algorithms provide enhanced support for AES, Triple-DES, SHS, HMAC, and AES DRBG. All implementations are packaged into a library, and it is used by Microsoft and other third-party applications." 11/28/12: Added new tested information; |
1902 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 6.2.9200 |
Qualcomm Snapdragon S4 w/ Windows RT (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Windows RT (ARMv7 Thumb-2); Intel Core i7 with AES-NI w/ Windows 8 Enterprise (x64); Intel Pentium D w/ Windows 8 Enterprise (x64); AMD Athlon 64 X2 Dual Core w/ Windows 8 Enterprise (x86); Intel Core i7 with AES-NI w/ Windows Server 2012 (x64); Intel Pentium D w/ Windows Server 2012 (x64); Qualcomm Snapdragon S4 w/ Windows Phone 8 (ARMv7 Thumb-2); Intel x64 Processor w/ Surface Windows 8 Pro (x64); Intel x64 Processor with AES-NI w/ Surface Windows 8 Pro (x64) ;  Intel Core i7 without AES-NI w/ Windows Storage Server 2012; Intel Core i7 with AES-NI w/ Windows Storage Server 2012 | 9/13/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Symmetric Algorithm Implementation is used by various Microsoft libraries to provide the basic symmetric algorithms AES, SHA, and Triple-DES." 11/28/12: Added new tested information; |
1901 | Sicore Technologies 510 Grumman Road West Suite 207 Bethpage, NY 11714 USA -Godfrey Vassallo
-Chris Colicino
|
Version 1.2 (Firmware) Part # PPC460EXr |
PPC460EXr | 9/13/2012 |
SHA-256 
(BYTE-only) "The MFF SHA-256 Algorithm is used as the cryptographic hash function for the SHIELD Coprocessor." |
1900 | Cocoon Data Holdings Limited. Level 4 152-156 Clarence St Sydney, NSW 2000 Australia -Simon Wild
-Stephen Thompson
|
Version 1.8 |
2 X 2.4 GHz Quad-Core Intel Xeon w/ OS X; 2 X 2.4 GHz Quad-Core Intel Xeon w/ Windows XP Professional (x86); 2 X 2.4 GHz Quad-Core Intel Xeon w/ Windows XP Professional (x64); 2 X 2.4 GHz Quad-Core Intel Xeon w/ Ubuntu 10.04.02 (x86); 2 X 2.4 GHz Quad-Core Intel Xeon w/ Ubuntu 10.04.02 (x64); Core 2 Duo T667 2.2 GHz w/ Windows XP 32-bit; Service Pack 3 w/ MSVC2012; Core2 Duo T6670 2.2 GHz w/ Windows XP 32-bit; Service Pack 3 w/ MSVC2010; Core2 Duo T6670 2.2GHz w/ Windows 7 32-bit w/ MSVC2010 redistributable; Core i5 M450 2.4GHz w/ Windows 7 64-bit w/ MSVC2010 redistributable; Core2 Duo T6670 2.2 GHz w/ Windows 7 32-bit w/ MSVC2012 redistributable; Core i5 M450 2.4GHz w/ Windows 764-bit w/ MSVC2012 redistributable; Core i7 3615QM 2.3GHz w/ Ubuntu 12.04 LTS 32-bit on VMWare Fus. 4.1.3 on OSX; Core i7-3615QM 2.3Ghz w/ Ubuntu 12.04 LTS 64-bit on VMWare Fus. 4.1.3 on OSX; Dual CPU Xeon 5160 3GHz w/ Ubuntu 12.04 LTS 64-bit; Intel CPU Xeon 5110 1.6GHz w/ Ubuntu 12.04 LTS 32-bit; Core i7-3615QM 2.3GHz w/ RHEL 6.3 64-bit on VMWare Fus. 4.1.3 on OSX 10.8.2; Dual CPU Xeon 5160 3GHz w/ Redhat Enterprise Linux Server 6.3 64-bit; Intel CPU Xeon 5110 1.6GHz w/ RHEL 6.3 32- bit on VMWare Fusion 4.1.3 on OSX 10.8.2; Dual CPU Xeon 5110 1.5GHz w/ Redhat Enterprise Linux Server 6.3 32-bit; 2.3GHz Intel Core i7 w/ Mac OSX 10.8.2 | 8/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cocoon Data Secure Objects C++ Cryptographic Module Version 1.8 has been implemented as part of the Cocoon Data Secure Objects solution, an encryption-based access control system for protecting the confidentiality and integrity of electronic files." 03/27/13: Added new tested information and updated implementation information; |
1899 | Ultra Electronics DNE Technologies 50 Barnes Park North Wallingford, CT 06492 USA -Eric Ferguson
|
Version 3.2 (Firmware) |
Freescale MPC8439EA | 8/27/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Ultra Electronics DNE Technologies PacketAssure iQ1000 is a rugged, one 19" rack unit Service Delivery Management (SDM) appliance." |
1898 | Hewlett-Packard Longdown Avenue Stoke Gifford, Bristol BS34 8QZ United Kingdom -Laura Loredo
|
Version OpenSSL 1.0.1c/FIPS 2.0/CN22745 (Firmware) |
ARM966E | 8/27/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hewlett Packard LTO-6 Tape Drive is a multi-chip standalone module composed of hardware and firmware components, providing cryptographic services to a host." 09/07/12: Updated implementation information; |
1897 | Hewlett-Packard Longdown Avenue Stoke Gifford, Bristol BS34 8QZ United Kingdom -Laura Loredo
|
Version 1.0 (Firmware) |
ARM966E | 8/27/2012 |
SHA-256 
(BYTE-only) "The Hewlett Packard LTO-6 Tape Drive is a multi-chip standalone module composed of hardware and firmware components, providing cryptographic services to a host." |
1896 | Osterhout Design Group 153 Townsend Street, Ste. 570 San Francisco, CA 94107 USA -Paul Matz
-Patrick Carroll
|
Part # TI OMAP4 4460 |
N/A | 8/27/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Security solutions for the OMAP4 Android Mobile markets. This product includes trusted boot, mandatory user authentication, data-at-rest, and data-in-transit encryption." |
1895 | Osterhout Design Group 153 Townsend Street, Ste. 570 San Francisco, CA 94107 USA -Paul Matz
-Patrick Carroll
|
Version 1.0 |
TI OMAP4 4460 w/ Android Gingerbread 2.3.5 with kernel 2.6.35 | 8/27/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security solutions for the OMAP4 Android Mobile markets. This product includes trusted boot, mandatory user authentication, data-at-rest, and data-in-transit encryption." |
1894 | Thales Communications, Inc. 22605 Gateway Center Drive Clarksburg, MD 20871 USA -Darlo Concepcion
-Jim Kent
|
Version 01.00.02.0013 |
Marvell PXA320 w/ Green Hills INTEGRITY 5.0.10 | 8/22/2012 |
SHA-1     
(BYTE-only) "The Software Liberty Cryptographic Module is a software component that is used to provide cryptographic services in Thales radio communications equipment." |
1893 | Thales Communications, Inc. 22605 Gateway Center Drive Clarksburg, MD 20871 USA -Darlo Concepcion
-Jim Kent
|
Version 01.00.02.0013 |
Marvell PXA320 w/ Green Hills INTEGRITY 5.0.10 | 8/22/2012 |
SHA-1     
(BYTE-only) "The Software Liberty Cryptographic Module is a software component that is used to provide cryptographic services in Thales radio communications equipment." |
1892 | Hewlett-Packard (TippingPoint) 14231 Tandem Boulevard Austin, TX 78728 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.5 (Firmware) |
Intel Jasper Forest Quad-Core | 8/22/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint IPS NX-Platform operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. The IPS provides cryptographic services to protect the management of the device." |
1891 | Check Point Software Technologies 5 Ha'solelim Street Tel Aviv, 67897 Israel -Malcolm Levy
|
Version 2.0 |
Intel® Core i7 @ 2.40 GHz with AES-NI w/ Pre-Boot EFI (via rEFIt on Mac OS X 10.7) 64-bits; Intel® Core i5-2400 @ 3.10 GHz with AES-NI w/ Microsoft Windows 7 User Space 32-bits; Intel® Core i5-2400 @ 3.10 GHz with AES-NI w/ Microsoft Windows 7 Kernel Space 32-bits; Intel® Core i5-2400 @ 3.10 GHz with AES-NI w/ Microsoft Windows 7 User Space 64-bits; Intel® Core i5-2400 @ 3.10 GHz with AES-NI w/ Microsoft Windows 7 Kernel Space 64-bits; Intel® Core i7 @ 2.40 GHz with AES-NI w/ Mac OS X 10.7 User Space 32-bits; Intel® Core i7 @ 2.40 GHz with AES-NI w/ Mac OS X 10.7 Kernel Space 32-bits; Intel® Core i7 @ 2.40 GHz with AES-NI w/ Mac OS X 10.7 User Space 64-bits; Intel® Core i7 @ 2.40 GHz with AES-NI w/ Mac OS X 10.7 Kernel Space 64-bits; Intel® Core i7 @ 2.40 GHz w/ Pre-Boot EFI (via rEFIt on Mac OS X 10.7) 64-bits; Intel(R) Core 2 Duo CPU E6550 @ 2.33GHz w/ Microsoft Windows 7 User Space 32-bits; Intel(R) Core 2 Duo CPU E6550 @ 2.33GHz w/ Microsoft Windows 7 Kernel Space 32-bits; Intel® Core 2 Duo Processor E6600 @ 2.40GHz w/ Microsoft Windows 7 User Space 64-bits; Intel® Core 2 Duo Processor E6600 @ 2.40GHz w/ Microsoft Windows 7 Kernel Space 64-bits; Intel® Core i7 @ 2.40 GHz w/ Mac OS X 10.7 User Space 32-bits; Intel® Core i7 @ 2.40 GHz w/ Mac OS X 10.7 Kernel Space 32-bits; Intel® Core i7 @ 2.40 GHz w/ Mac OS X 10.7 User Space 64-bits; Intel® Core i7 @ 2.40 GHz w/ Mac OS X 10.7 Kernel Space 64-bits | 8/22/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Check Point Crypto Core 2.X is a 140-2 Level 1 cryptographic module for Windows platforms, Check Point Pre-Boot Environment and Mac OS X. The module provides cryptographic services accessible in pre-boot mode, kernel mode and user mode on the respective platforms through implementation of platform specific binaries" |
1890 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Nick Gottuso
|
Version 11.5.5 (Firmware) |
Intel E5300; Intel E3400 | 8/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
1889 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Intel Core i7-2600 w/ Microsoft Windows Server 2008 64-bit | 8/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1888 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Chela Diaz de Villegas
|
Version 1.0 |
Intel Xeon w/ Microsoft 2008 R2 (64-bit); Intel Celeron w/ Windows 2008 R2 (64-bit) | 8/13/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Vulnerability Manager." |
1887 | Integral Memory PLC. Unit 6 Iron Bridge Close Iron Bridge Business Park Off Great Central Way London, Middelsex NW10 0UF United Kingdom -Patrick Warley
-Samik Halai
|
Part # PS3108 or PS3105 |
N/A | 8/13/2012 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "The Integral AES 256 bit Crypto SSD is removable storage devices which encrypts documents transferred onto them. The Integral 256 bit Crypto SSD comes in 4 GB, 8 GB, 16 GB, 32 GB 64 GB 128 GB, 256 GB, 512 GB and 1 TB versions." 05/16/13: Updated implementation information; |
1886 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Intel Core i7-2600 w/ Microsoft Windows Server 2008 64-bit | 8/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1885 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
AMD Opteron X86_64 w/ Microsoft Windows Server 2008 32-bit | 8/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1884 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Sun UltraSPARC T1 64-bit w/ Sun Solaris 10 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1883 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Sun UltraSPARC T1 64-bit w/ Sun Solaris 10 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1882 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM zSeries z196 64-bit w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1881 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM zSeries z196 64-bit w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1880 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Intel Core i7-2600 w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1879 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
Intel Core i7-2600 w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1878 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM PowerPC 970 w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1877 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM PowerPC 970 w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1876 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
AMD Opteron X86_64 w/ Red Hat Enterprise Linux Server 5 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1875 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM PowerPC 5 64-bit w/ IBM AIX 6.1 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1874 | IBM® Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia -Peter Waltenberg
|
Version 8.2.2.0 |
IBM PowerPC 5 64-bit w/ IBM AIX 6.1 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 09/26/12: Updated implementation information; |
1873 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Diana Robinson
-Tammy Green
|
Version 1.0 |
8-core Intel Xeon E5 w/ Solera OS 6.5.0 with VMware ESX 5.0; dual Intel Xeon w/ Solera Operating Environment v6.5.0; Intel Xeon E5 w/ Solera OS 6.6.9 with VMware ESX 5.5; Intel Xeon E5 w/ Solera OS 6.6.9 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic module provides cryptographic services for Solera DeepSee Software, a security intelligence and analytics solution that creates a complete record of network traffic. The module is a shared library that links to Solera DeepSee components and is executed on a GPC or on a supported VM hypervisor." 08/10/12: Updated implementation information; |
1872 | BULL S.A.S. Rue Jean Jaurès Les Clayes sous Bois, 78340 France -Jean-Luc CHARDON
-Pierre-Jean AUBOURG
|
Version V1.04-00L (Firmware) |
Freescale MPC8248 | 8/8/2012 |
SHA-256 
(BYTE-only) "Bull implements this algorithm for applications running on its CHR hardware platform providing secure cryptographic resources to products developed by Bull or other Application Providers, including the CRYPT2Pay HR and CRYPT2Protect product lines" |
1871 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Bipin Agarwal
|
Version FIFIPS07300_0314121830 (Firmware) |
Freescale MPC 8544E | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade One strategy helps simplify networking infrastructures through innovative technologies and solutions." |
1870 | GDC Technology (USA) LLC 1016 West Magnolia Boulevard Burbank, California 91506 USA -Pranay Kuma
-Peter Lin
|
Version FIPS-v2_0 (Firmware) |
Freescale QorIQ | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging." |
1869 | AJA Video Systems, Inc. 180 Litton Drive Grass Valley, CA 95945 USA -Ujval Lodha
|
Version 1.0.0.21 (Firmware) |
Xilinx V6 FPGA | 8/8/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "4K Image Media Block for digital cinema applications." |
1868 | Hewlett Packard Development Company, L.P. 4209 Technology Drive Fremont, CA 94538 USA -Kurt Heberlein
|
Version 3.1.1.MU1+P16 |
Intel Quad Core 2.8GHz w/ GNU / Linux (Debian) 5.0.2 | 8/8/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "InFormOS is built on a hardened base of Debian Linux with proprietary extensions, and utilizes standard, vendor supplied, versions of libcrypto (OpenSSL), and libgcrypt (GNUTLS) for crypto operations. The InFormOS CLI client distribution contains the identical version of OpenSSL as found in InFormOS. The version is 0.9.8o." |
1867 | Hewlett Packard Development Company, L.P. 4209 Technology Drive Fremont, CA 94538 USA -Kurt Heberlein
|
Version 4.2.1 |
Intel Core i7 CPU 2.67 GHz w/ Windows 7 Enterprise | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "InForm IMC is a java based client for administration of the InFormOS. It utilizes a bundled JVM including the Sun Java Cryptography Extension (SunJCE) at version 1.6 from JDK1.6.0_33." |
1866 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SKC1.4.1 |
MSM8260 1.2 GHz (51,7,1,04d,0) w/ Android Ice cream sandwich 4.0 | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 09/21/12: Updated implementation information; |
1865 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version KM1.1 |
MSM8960 1.5 GHz (51,7,1,04d,0) w/ Android Ice cream sandwich 4.0 | 8/3/2012 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." 09/21/12: Updated implementation information; |
1864 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version KM1.1 |
MSM8260 1.2 GHz (51,7,1,04d,0) w/ Android Ice cream sandwich 4.0 | 8/3/2012 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." 09/21/12: Updated implementation information; |
1863 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SKC1.4.1 |
MSM8260 1.2 GHz (51,7,1,04d,0) w/ Android Ice cream sandwich 4.0 | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 09/21/12: Updated implementation information; |
1862 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Juno 12.1R2 (Firmware) |
Freescale PowerPC; ARMv5 | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1861 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Juno 12.1R2 (Firmware) |
Freescale PowerPC; ARMv5 | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1860 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sharath Sridhar
|
Version Juno 12.1R2 (Firmware) |
Freescale PowerPC; ARMv5 | 8/3/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable switching solutions specifically designed to meet the needs of both enterprises and service providers. All of our switches - modular and fixed platforms - run on one common operating system- Junos." |
1859 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version Rel 1 (Firmware) |
PMC RM5261A MIPS 350MHz; Intel Woodcrest 2.13GHz; Power-PC 405 250MHz | 7/31/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Cryptographic Module (IC2M)-Extended firmware version Rel 1 covers Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)." 12/07/12: Updated implementation information; |
1858 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version Rel 1 (Firmware) |
PMC RM5261A MIPS 350MHz; Intel Woodcrest 2.13GHz; Power-PC 405 250MHz | 7/30/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IOS Common Cryptographic Module (IC2M) firmaware version Rel 1 covers Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)" 12/07/12: Updated implementation information; |
1857 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Minda Zhang
|
Part # Armada PXA-2128 |
N/A | 7/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Armada PXA2128 is an application processor SoC (http://www.marvell.com/application-processors/armada/pxa2128/). It has a dedicated security hardware module, known as WTM, that runs secure firmware kernel to perform device trusted boot, access control, authentication, key management, DRM, disk encryption, and FIPS certified cryptographic operations." |
1856 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos-FIPS 12.1R2 (Firmware) |
Intel(R) Pentium(R) M processor 2.00GHz; Intel Pentium III | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1855 | CREDANT Technologies, Inc. 15303 Dallas Parkway Suite 1420 Addison, TX 75001 USA -Chris Burchett
-Brad Conte
|
Version 1.8 |
Intel Core 2 Duo w/ Windows 7 Enterprise x64 Edition (64-bit); Intel Core 2 Duo w/ Windows 7 Enterprise (32-bit); Intel Core i7 w/ Mac OS X Lion 10.7.3 (64-bit); Intel Core i7 w/ Mac OS X Lion 10.7.3 (32-bit); Intel Core 2 Duo w/ Ubuntu Linux 11.04 (64-bit); Intel Core 2 Duo w/ Ubuntu Linux 11.04 (32-bit) | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CREDANT CmgCryptoLib is a software cryptographic library that implements Triple-DES, AES, DRBG SP 800-90, SHA-2, SHA-1, HMAC-SHA2, and HMAC-SHA-1 algorithms for CREDANT Mobile Guardian (CMG) products." |
1854 | CREDANT Technologies, Inc. 15303 Dallas Parkway Suite 1420 Addison, TX 75001 USA -Chris Burchett
-Brad Conte
|
Version 1.8 |
Intel Core 2 Duo w/ Windows 7 Enterprise x64 Edition (64-bit); Intel Core 2 Duo w/ Windows 7 Enterprise (32-bit); Intel Core i7 w/ Mac OS X Lion 10.7.3 (64-bit); Intel Core i7 w/ Mac OS X Lion 10.7.3 (32-bit) | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CREDANT CmgCryptoLib is a software cryptographic library that implements Triple-DES, AES, DRBG SP 800-90, SHA-2, SHA-1, HMAC-SHA2, and HMAC-SHA-1 algorithms for CREDANT Mobile Guardian (CMG) products." |
1853 | MikroM GmbH Dovestr. 1 Berlin, BE 10587 Germany -Michael Hagemeister
-Martin Zielke
|
Version 10.0.48.17701 (Firmware) Part # 2224 Rev. D; 2224 Rev. C |
built-in Atmel AT91SAM7 RISC Processor | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Firmware running on the security CPU of MVC200-DC cryptographic module, which is a multi-chip hardware decoder targeting the professional application Digital Cinema" |
1852 | MikroM GmbH Dovestr. 1 Berlin, BE 10587 Germany -Michael Hagemeister
-Martin Zielke
|
Version 10.0.119.17676 (Firmware) Part # 2224 Rev. D; 2224 Rev. C; 2224 Rev. E |
built-in XC3S4000-5FGG676C Xilinx Spartan-3 series FPGA | 7/18/2012 |
SHA-1     
(BYTE-only) "Firmware running on the main FPGA of MVC200-DC cryptographic module, which is a multi-chip hardware decoder targeting the professional application Digital Cinema" |
1851 | MikroM GmbH Dovestr. 1 Berlin, BE 10587 Germany -Michael Hagemeister
-Martin Zielke
|
Version 2.1.0.17662 (Firmware) Part # 2224 Rev. D; 2224 Rev. C; 2224 Rev. E |
built-in MSP8510-1000G CPU by PMC-Sierra | 7/18/2012 |
SHA-256 
(BYTE-only) "Bootloader firmware running on the main CPU of MVC200-DC cryptographic module, which is a multi-chip hardware decoder targeting the professional application Digital Cinema" |
1850 | SafeLogic Inc 530 Lytton Ave, Ste 200 Palo Alto, CA 94301 USA |
Version 2.1 |
A5X w/ iOS 5.1; A5X w/ iOS 6; A5X w/ iOS 7 | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CryptoComply | Mobile is a standards-based “Drop-in Compliance” solution for mobile devices. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads functions for secure key management, data integrity, data at rest encryption, and secure communications." 10/31/12: Added new tested information; |
1849 | SafeLogic Inc 530 Lytton Ave, Ste 200 Palo Alto, CA 94301 USA |
Version 2.1 |
ARM Cortex-A9 w/ Android Version 4.0 | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CryptoComply | Mobile is a standards-based “Drop-in Compliance” solution for mobile devices. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads functions for secure key management, data integrity, data at rest encryption, and secure communications." 11/14/12: Updated vendor information; |
1848 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SBC1.45_1.1 |
MSM8960 1GHz (51,7,1,4D,0) w/ Android Ice cream sandwichc 4.0 | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Java-based Bouncycastle used by Samsung devices to provide secure cryptography." 09/21/12: Updated implementation information; |
1847 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Sundar Ram T S B
|
Version Junos-FIPS 12.1R2 (Firmware) |
Intel Pentium III; Intel(R) Pentium(R) M processor 2.00GHz | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1846 | Juniper Networks, Inc 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Balachandra Shanabhag
|
Version Junos-FIPS 12.1R2 (Firmware) |
Intel(R) Pentium(R) M processor 2.00GHz; Intel(R) Pentium(R) M processor 2.00GHz | 7/18/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Comprehensive, scalable and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, Multiservice edge and edge ethernet - run on one common operating system- Junos." |
1845 | Stanley Security Solutions, Inc. 6161 E 75th St. P.O. Box 50444 Indianapolis, IN 46250 USA -Robert Strong
|
Version 3.017.154 (Firmware) |
Motorola 5272 Freescale Coldfire processor running uCLinux version 2.4.29. | 7/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Open SSL Version 1.2.3 SHS algorithm implemented on Motorola 5272 Freescale Coldfire processor running uCLinux version 2.4.29." |
1844 | Thales E-Security Ltd Jupiter House Station Road Cambridge, CB5 8JJ UK -Thales Certification Team
-Thales Sales
|
Version 2.51.10 (Firmware) |
Freescale PowerPC | 7/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The nShield algorithm library provides cryptographic functionality for Thales''s nShield Hardware Security Modules" 12/17/12: Updated implementation information; |
1843 | Inside Secure 41 Parc Club du Golf 13856, Aix-en-Provence France -Ewart Gray
-David Cunningham
|
Version 1.0.1 (Firmware) Part # VaultIC441M/VaultIC421M/VaultIC405M |
Inside Secure VaultIC441M/VaultIC421M/VaultIC405M | 7/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "VaultIC (R) are security modules designed to secure applications such as anti-cloning, physical access control, personal access control for multimedia and web applications, hardware authentication, user strong authentication, SSL support, PKCS#11 to Microsoft (R) CSP applications, PKI, DRM, trusted computing and IP protection." 07/18/12: Updated implementation information; |
1842 | SAP AG Albert-Einstein-Allee 3 Bensheim, NRW 64625 Germany -Stephan André
-Thomas Rothe
|
Version 2.0.0.1 |
Intel Core i5 660 3,33 GHz w/ Windows 7 Enterprise SP1 | 7/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SAP NW SSO 2.0 Secure Login Library Crypto Kernel v2.0.0.1 is a shared library, i.e. it consists of software only. SAP NW SSO 2.0 Secure Login Library Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions." |
1841 | Sonus Networks 4 Technology Park Drive Westford, MAS 01886 USA -Kumar Saurabh
-Sandeep Kaushik
|
Version 9.0 |
PowerPC w/ pSOS | 6/29/2012 |
SHA-1     
(BYTE-only) "GSX9000 and NBS9000 software runs on pSOS and utilizes standard libcrypto (OpenSSL) and Mocana SSL stack for crypto operations. " 07/03/12: Updated implementation information; |
1840 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0.1 |
ARMv7 w/ Apple iOS 5.1; ARMv5TEJ w/ Microsoft Windows CE 6.0 R2; ARMv7 w/ Microsoft Windows CE 5.0 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." |
1839 | Infoblox 4750 Patrick Henry Drive Santa Clara, CA 95054 USA -Bill Lane
|
Version 1.0 (Firmware) |
Intel Xeon; Intel Pentium | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Infoblox® NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids™ to enable distributed delivery of core network services – including DNS, DHCP, IPAM, NTP, TFTP, and FTP." |
1838 | Telephonics Sweden AB Vattenkraftsvagen 8 Stockholm, S-13570 Sweden -Ingi Bjornsson
-Magnus Eriksson
|
Version openssl-0.9.8g (Firmware) Part # 010.6882-01 Rev. B2 |
Atmel AT91R40008 | 6/29/2012 |
SHA-1     
(BYTE-only) "TruLink is a fully duplex, short range wireless intercom system that may be employed on aircraft, boats and ground vehicles. An AES-128 or 256 ECB algorithm is employed to encrypt either voice or data between the wireless units. Keys are generated by PC based application and loaded via a serial port on the wireless units." |
1837 | Telephonics Sweden AB Vattenkraftsvagen 8 Stockholm, S-13570 Sweden -Ingi Bjornsson
-Magnus Eriksson
|
Version openssl-0.9.8g (Firmware) Part # 010.6792-01 Rev. H3 |
Atmel AT91M40800 | 6/29/2012 |
SHA-1     
(BYTE-only) "TruLink is a fully duplex, short range wireless intercom system that may be employed on aircraft, boats and ground vehicles. An AES-128 or 256 ECB algorithm is employed to encrypt either voice or data between the wireless units. Keys are generated by PC based application and loaded via a serial port on the wireless units." |
1836 | KOBIL Systems GmbH Pfortenring 11 Worms, 67547 Germany -Markus Tak
-Erik Dahmen
|
Part # v1.8 |
N/A | 6/29/2012 |
SHA-256 
(BYTE-only) "KOBIL mIDentity is a secure portable two-factor authentication solution. Enter the safe and flexible world of mIDentity and use your digital identity to run a multitude of applications. This module is used in mIDentity 4smart data storage FW v0.75 / fullsize FW v0.75 / visual FW v0.76." |
1835 | KOBIL Systems GmbH Pfortenring 11 Worms, 67547 Germany -Markus Tak
-Erik Dahmen
|
Version v1.0 (Firmware) |
ATMEL AT32UC3B0256 | 6/29/2012 |
SHA-256 
(BYTE-only) "KOBIL mIDentity is a secure portable two-factor authentication solution. Enter the safe and flexible world of mIDentity and use your digital identity to run a multitude of applications. This module is used in mIDentity 4smart banking FW v0.80, mIDentity 4smart data storage FW v0.75 / fullsize FW v0.75 / visual FW v0.76, and mIDentity mini FW 2.0.0." |
1834 | KOBIL Systems GmbH Pfortenring 11 Worms, 67547 Germany -Markus Tak
-Erik Dahmen
|
Part # v1.3 |
N/A | 6/29/2012 |
SHA-256 
(BYTE-only) "KOBIL mIDentity is a secure portable two-factor authentication solution. Enter the safe and flexible world of mIDentity and use your digital identity to run a multitude of applications. This module is used in mIDentity 4smart banking FW v0.80." |
1833 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 |
Intel Xeon w/ MLOS v1.0 running on VMware vSphere 4.1; Intel Xeon w/ MLOS v1.0 running on VMware vSphere 5.0 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Web Gateway Cryptographic Engine v1.0 provides the services necessary to support the cryptographic features and functions of McAfee''s line of anti-malware solutions, including the McAfee Web Gateway products." |
1832 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 (Firmware) |
Intel Xeon | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Web Gateway Cryptographic Engine v1.0 provides the services necessary to support the cryptographic features and functions of McAfee''s line of anti-malware solutions, including the McAfee Web Gateway products." |
1831 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SFOpenSSL_1.0.0e-10 |
MSM8960 1GHz (51,7,1,4D,0) w/ Android Ice cream sandwich 4.0 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography." 09/21/12: Updated implementation information; |
1830 | IBM Corporation 11400 Burnet Road Austin, TX 78758 USA -Tom Benjamin
-Kevin Driver
|
Version 1.7 |
Intel Core 2 Duo w/ Windows 7 32-bit; Intel Core 2 Duo w/ Solaris 11.0; IBM PowerPC Power6 w/ IBM AIX 7.1 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for Multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework that is part of all JVM''s at the 1.4.0 level and higher." |
1829 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.4.6 (Firmware) |
Intel Xeon; Intel Core i3; Intel Celeron; Intel 2x Xeon | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway libgcrypt v1.4.6 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." |
1828 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
1827 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software." |
1826 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A4 w/ iOS 6 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software. " |
1825 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A5 w/ iOS 6 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software. " |
1824 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A5 w/ iOS 6 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software. " |
1823 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A4 w/ iOS 6 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software. " |
1822 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version KM1.1 |
ARMv7 w/ Android Ice cream sandwich 4.0 | 6/29/2012 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." 09/21/12: Updated implementation information; |
1821 | Samsung Electronics Co., Ltd R4 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do 443-742 Korea -Ross Choi
-Kyung-Hee Lee
|
Version SKC1.4.1 |
MSM8260 1.2 GHz (51,7,1,04d,0) w/ Android Ice cream sandwich 4.0 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 09/21/12: Updated implementation information; |
1820 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -Sales
|
Version 5.5fs |
PowerQUICC III w/ Integrity 5.0; ARMv7 w/ IOS 5; ARMv7 w/ iOS6 | 6/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." 03/25/13: Added new tested information; |
1819 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
1818 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
1817 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
1816 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
1815 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
1814 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
1813 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i7 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
1812 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
1811 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using the SSE3 processor instruction set." |
1810 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Intel i5 w/ OSX 10.8 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software." |
1809 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.4.6 |
Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v5.0; Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v4.1 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway libgcrypt v1.4.6 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." |
1808 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Joe Warren
|
Version 5.0 (Firmware) |
PowerPC Core 405 | 6/25/2012 |
SHA-384 
(BYTE-only) "The Thales Datacryptor protects the confidentiality and integrity of sensitive data travelling over public networks." |
1807 | Ultra Electronics 3eTI 9715 Key West Avenue, Suite 500 Rockville, MD 20850 USA -Harinder Sood
-Chris Guo
|
Version 1.0 (Firmware) |
Freescale MPC8378E | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Crypto Algorithms running on MPC8378E hardware for accelerated performance." |
1806 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A5 w/ iOS 6 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
1805 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A4 w/ iOS 6 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256." |
1804 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A5 w/ iOS 6 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
1803 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 3.0 |
Apple A4 w/ iOS 6 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256." |
1802 | Hewlett-Packard Company 19091 Pruneridge Ave., MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 5.0.0 (Firmware) |
Intel Xeon E5-2640 | 6/25/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HP Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover." |
1801 | Ultra Electronics 3eTI 9715 Key West Avenue, Suite 500 Rockville, MD 20850 USA -Harinder Sood
-Chris Guo
|
Version 1.0.1-a (Firmware) |
MPC8378E | 6/20/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Algorithms listed are used to provide encryption and authentication services within 3eTI networking products." |
1800 | Totemo AG Totemo AG Freihofstrasse 22 CH-8700 Kusnacht Kusnacht, n/a Switzerland -Marcel Mock
|
Version 2.0 |
Intel Xeon E5504 processor w/ Totemo Appliance OS 2.0 v0711 with JRE 7.0 | 6/15/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites." 06/14/12: Update implementation information and added new tested information; |
1799 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version SKC1.4.1 |
ARMv7 w/ Android Ice Cream Sandwich 4.0 | 6/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 10/12/12: Updated implementation information; |
1798 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.44.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 6/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size and covers the AES NI Intel support." 09/13/12: Updated implementation information; |
1797 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.44.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 6/13/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size and covers the AES NI Intel support." 09/13/12: Updated implementation information; |
1796 | Hewlett-Packard Company 8000 Foothills Boulevard Roseville, CA 95747 USA -Sunil Amanna
|
Version 5.3.1 (Firmware) |
Freescale P2020E | 6/7/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Standard operating software for KA-platform switch products." |
1795 | Hewlett-Packard Company 8000 Foothills Boulevard Roseville, CA 95747 USA -Sunil Amanna
|
Version 5.3.1 (Firmware) |
Freescale P2020E | 6/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Standard operating software for KA-platform switch products." |
1794 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # CN1620-400BG233-P-G |
N/A | 6/7/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." |
1793 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Part # CN1520-350BG256-G, v1.2 |
N/A | 6/7/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." |
1792 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version KM1.1 |
ARMv7 w/ Android Ice Cream Sandwich 4.0 | 6/7/2012 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices." 10/12/12: Updated implementation information; |
1791 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA |
Version 8.4.4.1(Firmware) |
AMD Geode; Intel Pentium 4; Intel Celeron; Intel E7520; Intel Xeon 5500 | 6/7/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment." 06/15/12: Updated implementation information; <06/25/12: Updated implementation information; |
1790 | Secure Agent 2448 E. 81st Street Tulsa, OK 74137 USA -Steve Soodsma
|
Version 2.2.005 |
Intel Xeon w/ Solaris 10 | 6/5/2012 |
SHA-256 
(BYTE-only) "The Sailib module provides encryption services for the SecureAgent suite of products. The module dynamically links with libgcrypt which provides the cryptographic primitives used by the module." |
1789 | Chrisite Digital Systems Canada, Inc. 809 Wellington Street North Kitchener, ON N2G4Y7 CANADA -Kevin Draper
|
Version ipx_hmac_sha1_top_Xil_V6_1_5_2.23_ISE13.2 (Firmware) |
Xilinx Vertex 6 FPGA (XC6VLX240T) | 6/5/2012 |
SHA-1     
(BYTE-only) "Christie Integrated Media Block" |
1788 | Chrisite Digital Systems Canada, Inc. 809 Wellington Street North Kitchener, ON N2G4Y7 CANADA -Kevin Draper
|
Version SM_LIBSSL: 1.0.1-2601 (Firmware) |
Xilinx Spartan 6 (XC6SLX45) | 6/5/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Christie Integrated Media Block" 06/08/12: Added new tested information; |
1787 | AuthenTec Inc. Boxtelseweg 26A Vught, 5261 NE The Netherlands -Bob Oerlemans
|
Version 1.0.3 |
ARMv7 w/ Android 4.0; ARMv7 w/ Android 2.3; ARMv7 w/ Linux (kernel 2.6) | 6/5/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from AuthenTec Inc. The module is a toolkit which provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to, primitives needed for DAR, DRM, TLS, and VPN on mobile devices." |
1785 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -Mocana Sales
|
Version 5.5f |
ARMv7 w/ Android 4.0; ARMv7 w/ Android 2.2; ARMv7 w/ Android 2.3; ARMv7 w/ Android 4.1; Intel Core 2 Duo w/ Ubuntu Linux 32 bit; Intel Core 2 Duo w/ Ubuntu Linux 64 bit; FreeScale QorIQ P2 w/ VxWorks 6.8 | 5/31/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." 11/15/12: Added new tested information; |
1784 | 3S Group Incorporated 125 Church Street, N.E., Suite 204 Vienna, VA 22180 USA -Satpal S. Sahni
|
Version 1.0 (Firmware) |
Cavium Octeon | 5/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "3SGX is a high performance PCIe cryptograhic module that provides complete cryptographic support to large numbers of users or applications simultaneously. 3SGX is the core of 3S Group''s hardare security appliances, ideal for enterprise key management, virtualization and cloud server solutions that demand high throughput." |
1783 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R7x with R7x hotfix (Firmware) |
Intel Xeon | 5/25/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Check Point Security Gateway is a security gateway that provides firewall, VPN, and intrusion prevention functionality within a network environment." |
1782 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R7x with R7x hotfix (Firmware) |
Intel Xeon | 5/25/2012 |
SHA-1     
(BYTE-only) "Check Point Security Gateway is a security gateway that provides firewall, VPN, and intrusion prevention functionality within a network environment." |
1781 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale MPC8548 | 5/25/2012 |
SHA-1     
(BYTE-only) "IOS cryptographic implementation for the 7600 series routers." |
1780 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA -Mike Scruggs
-TA (TAR) Ramanujam
|
Part # Nitrox III Series Die, v1.1 |
N/A | 5/25/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NITROX III chips implement SHA1/SHA2, 3DES/AES256 CBC, ModMul/ModEx/RSA, GCM and CTR modes, and SP800-90A DRBG. Perf: 5 to 30 Gbps encrypt/hash; 35K to 200K RSA 1024b ops/sec; 6K to 35K RSA 2048b ops/sec. NITROX III microcode also implements protocol-specific acceleration for IPSec and SSL." |
1779 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 1.0 (Firmware) |
Freescale MPC8358E | 5/25/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cisco C5915 is a PCI-104-based small form factor chassis less moderate performance router, part of the Embedded Services Router family. It is a follow-on to the 3251 Mobile Access Router card, offered to market through integration partners and mostly deployed for transportation customers, public safety agencies, and global defense organizations." 07/18/12: Updated implementation information; |
1778 | Biscom, Inc. 321 Billerica Road Chelmsford, MA 01824 USA -William Ho
-Sharif Rahman
|
Version 1.0 |
Intel Core i5 w/ Windows 2008 Server R2 with Sun JRE 6.0 | 5/17/2012 |
SHA-256 
(BYTE-only) "Biscom Cryptographic Library provides cryptographic services for various Biscom products." 01/17/13: Updated implementation information; |
1777 | Vidyo, Inc. 433 Hackensack Avenue Hackensack, NJ 07601 USA -Adi Regev
|
Version 1.0 |
Intel Core i5 with AES-NI w/ 32-bit Windows XP; Intel Core i5 with AES-NI w/ 64-bit Windows 7; Intel Core i5 with AES-NI w/ 32-bit Windows 7; Intel Xeon E3 with AES-NI w/ 64-bit Linux Ubuntu 10.04; Intel Xeon E3 with AES-NI w/ 32-bit Linux Ubuntu 10.04; Intel Core i5 with AES-NI w/ 64-bit Mac OS X 10.7.3; Intel Core i5 with AES-NI w/ 32-bit Mac OS X 10.7.3; Intel Core i5 with AES-NI w/ 64-bit Mac OS X 10.6.8; Intel Core i5 with AES-NI w/ 32-bit Mac OS X 10.6.8 | 5/17/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Vidyo creates HD video conferencing products that leverage their patented Adaptive Video Layering Architecture technology, which provides continuous HD video streaming regardless of network conditions. The Vidyo Cryptographic Security Kernel supplies the cryptographic services necessary to support Vidyo''s secure video and data transmissions." |
1776 | Vidyo, Inc. 433 Hackensack Avenue Hackensack, NJ 07601 USA -Adi Regev
|
Version 1.0 |
Intel Core Duo w/ 32-bit Mac OS X 10.6.8; Intel Core 2 Duo w/ 64-bit Mac OS X 10.6.8; Intel Core 2 Duo w/ 32-bit Mac OS X 10.7.3; Intel Core 2 Duo w/ 64-bit Mac OS X 10.7.3; Intel Xeon E50xx w/ 32-bit Linux Ubuntu 10.04; Intel Xeon E50xx w/ 64-bit Linux Ubuntu 10.04; Intel Core 2 Duo w/ 64-bit Windows 7; Intel Core Duo w/ 32-bit Windows 7; Intel Core Duo w/ 32-bit Windows XP; | 5/17/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Vidyo creates HD video conferencing products that leverage their patented Adaptive Video Layering Architecture technology, which provides continuous HD video streaming regardless of network conditions. The Vidyo Cryptographic Security Kernel supplies the cryptographic services necessary to support Vidyo''s secure video and data transmissions." |
1775 | Comtech EF Data Corporation 2114 West 7th Street Tempe, Arizona 85281 USA -Wallace Davis
|
Version 1.2.1 (Firmware) |
AMCC PowerPC 440EP | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "The Comtech EF Data FIPS Security Module features an FPGA to perform bulk encryption/decryption for Ethernet data traffic via the DMD2050E Satellite Modem, as well as firmware to provide the cryptographic functions needed to act as an endpoint for TLS and SSH management, and control traffic." |
1774 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Kevin Michelizzi
-Chien-Her Chin
|
Version 7.00.1687 |
MIPSII_FP (Sigma Designs SMP8654) w/ Windows Embedded Compact 7; MIPII (Sigma Designs SMP8654) w/ Windows Embedded Compact 7; ARMv7 (Texas Instruments EVM3530) w/ Windows Embedded Compact 7; ARMv6 (Samsung SMDK6410) w/ Windows Embedded Compact 7; ARMv5 (Freescale i.MX27) w/ Windows Embedded Compact 7; i586 (MSTI PDX-600) w/ Windows Embedded Compact 7 | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Microsoft Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH), designed for FIPS 140-2 compliance, is a general-purpose, software-based, cryptographic module. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography." |
1773 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Kevin Michelizzi
-Chien-Her Chin
|
Version 7.00.1687 |
Sigma Designs SMP8654 (MIPSII_FP) w/ Windows Embedded Compact 7; Sigma Designs SMP8654 (MIPSII) w/ Windows Embedded Compact 7; ARMv7 (Texas Instruments EVM3530) w/ Windows Embedded Compact 7; ARMv6 (Samsung SMDK6410) w/ Windows Embedded Compact 7; ARMv5 (Freescale i.MX27) w/ Windows Embedded Compact 7; i586 (MSTI PDX-600) w/ Windows Embedded Compact 7; | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces." |
1772 | Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R10 (Firmware) |
Intel Pentium M | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1771 | Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R10 (Firmware) |
Intel Pentium M | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1770 | Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos-FIPS 10.4R10 (Firmware) |
Intel Pentium M | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1769 | Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 USA -Kavitha Sivagnanam
|
Version Junos FIPS 10.4R10 (Firmware) |
Intel Pentium M | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Juniper Networks MX Series 3D Universal Edge Routers with the Multiservices DPC provides dedicated high-performance processing for flows and sessions, and integrated advanced security capabilities that protect the network infrastructure as well as user data." |
1768 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 3.0.0.16 |
PowerPC 604 (32-bit) w/ Wind River VxWorks 6.0 | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
1767 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 4.0.1 |
Intel Celeron w/ Microsoft Windows XP SP3 - x86 (32-bit); AMD Athlon XP1800+ w/ Microsoft Windows XP SP3 - x86 (64-bit); AMD Athlon 64 X2 w/ Microsoft Windows Server 2003 - x86 (32-bit); AMD Athlon 64 X2 4000+ w/ Microsoft Windows Server 2003 - x86(64-bit); Intel Itanium 2 w/ Microsoft Windows Server 2003 - Itanium 64-bit (Visual Studio 2005 SP1); Intel Itanium 2 w/ Microsoft Windows Server 2003 - Itanium 64-bit (Visual Studio 2010); AMD Athlon 64 X2 w/ Red Hat Enterprise Server 5.5 - x86 (32-bit); AMD Athlon 64 X2 w/ Red Hat Enterprise Server 5.5 - x86 (64-bit); Intel Itanium II w/ Red Hat Enterprise Server 5.5 - Itanium 64-bit; AMD Athlon 64 X2 w/ Red Hat Enterprise Linux 6.0 - x86 (32-bit); AMD Athlon 64 X2 w/ Red Hat Enterprise Linux 6.0 - x86(64-bit); PowerPC POWER3-II w/ Red Hat Enterprise Linux 5.0 - PPC 32-bit; PowerPC POWER3-II w/ Red Hat Enterprise Linux 5.0 - PPC 64-bit; Intel Core 2 Duo w/ Apple Mac OS X 10.6 Snow Leopard - x86 (32-bit); Intel Core 2 Duo w/ Apple Mac OS X 10.6 Snow Leopard - x86 (64-bit); Sun UltraSparc Iie w/ Solaris 10 - SPARC v8; Sun UltraSparc IIe w/ Solaris 10 - SPARC v8+; Sun UltraSparc IIIi w/ Solaris 10 - SPARC v9; Intel Celeron w/ Solaris 10 - x86 (32-bit); AMD Athlon 64 X2 w/ Solaris 10 - x86 (64-bit); HP PA-8600 w/ HP-UX 11.23 - PA RISC 2.0; HP PA-8600 w/ HP-UX 11.23 - PA-RISC 2.0W; Intel Itanium 2 w/ HP-UX 11.31 - Itanium 32-bit; Intel Itanium 2 w/ HP-UX 11.31 - Itanium 64-bit; PowerPC POWER5 w/ IBM AIX 5.3 - PPC 32-bit; PowerPC POWER5 w/ IBM AIX 5.3 - PPC 64-bit; PowerPC POWER5 w/ IBM AIX 6.1 - PPC 32-bit; PowerPC POWER5 w/ IBM AIX 6.1 - PPC 64-bit; PowerPC POWER7 w/ IBM AIX 7.1 - PPC 32-bit; PowerPC POWER7 w/ IBM AIX 7.1 - PPC 64-bit; Intel Core i7 M620 w/ Microsoft Windows 7 - x86 (64-bit) w/ AES-NI; Intel Core i7 M620 w/ Microsoft Window XP - x86 (32-bit) w/ AES-NI; Intel Core i5 2500 w/ Solaris 10 - x86 (64-bit) w/ AES-NI; Intel Core i5 2500 w/ Solaris 10 - x86 (32-bit)w/ AES-NI; Intel Core i7 w/ Red Hat Enterprise Linux v5.5 - x86 (32-bit)w/ AES-NI; Intel Core i7 w/ Red Hat Enterprise Linux v6.0 - x86 (64-bit) w/ AES-NI; Sun Sparc T4 w/ Solaris 10 - SPARC T4 | 5/9/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
1766 | GE Healthcare 3000 N Grandview Blvd Waukesha, WI 53188 USA -Krishna Inavolu
-Stephanie Swenor
|
Version 5.4F (Firmware) |
Intel Core 2 Duo | 5/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Mocana Cryptographic Library Version 5.4F." |
1765 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.9.0 (Firmware) |
Cavium Octeon Plus CN50XX; Cavium Octeon Plus CN56XX; Cavium Octeon Plus CN58XX | 5/7/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SonicWALL® Next-Generation Firewalls deliver superior gateway protection, inspection for SSL encrypted sessions, granular application intelligence and control. With SonicWALL Firewalls, IT can visualize applications running across a network-- allocating bandwidth for what''s essential and limiting or blocking what''s not." 05/17/12: Updated implementation information; |
1764 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Joe Warren
|
Version 5.0 (Firmware) |
PowerPC Core 405 | 4/30/2012 |
SHA-384 
(BYTE-only) "The Thales Datacryptor protects the confidentiality and integrity of sensitive data travelling over public networks." |
1763 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 (Firmware) |
Intel 2x Xeon; Intel Celeron; Intel Core i3; Intel Xeon | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway OpenSSL v1.0 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." 12/19/12: Added new tested information; |
1762 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 |
Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v5.0; Intel Xeon w/ Red Hat Linux 9 running on VMware ESXi v4.1 | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The McAfee Email Gateway OpenSSL v1.0 provides the services necessary to support the cryptographic features and functions of the McAfee Email Gateway line of hardware appliances, blade servers, and virtual appliances." 12/19/12: Added new tested information; |
1761 | Open Source Software Institute 8 Woodstone Plaza, Suite 101 Hattiesburg, MS 39402 USA -John Weathersby
|
Version 1.2.4 |
Intel Core i5 (x86) w/ MAC OS X (64-bit); Intel Core i5 (x86) w/ MAC OS X (32-bit); Apple A5 (ARMv7) w/ IOS | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a cryptographic library that can be downloaded from www.openssl.org/source/." |
1760 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Taiwan, ROC -Yu-Ling Cheng
-Ming-Hsin Chang
|
Part # EP4CGX150DF27C7N |
N/A | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "HiPKI SafGuard 1200 Cryptographic Library provides highly-secure cryptographic services,identity-based challenge-response authentication, and key storage for PKI Applications in the HiPKI Safguard 1200 HSM" |
1759 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA |
Version 4.3 (Firmware) |
Intel Core 2 Duo | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1758 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA |
Version 4.3 (Firmware) |
Intel Xeon | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1757 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA |
Version 4.3 (Firmware) |
Intel Xeon | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1756 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 USA |
Version 4.3 (Firmware) |
Intel XEON quad core | 4/30/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1755 | N/A | N/A | N/A | 4/30/2012 | N/A |
1754 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Iain Holness
|
Version 1.0 |
Intel Core 2 Duo w/ Microsoft Windows XP SP3; 3.0 GHZ Intel Pentium D Processor 830 (1CPU) w/ Microsoft Windows XP SP2; Intel Core 2 Duo w/ Windows 7 Ultimate SP1 X86; Intel Core 2 Duo w/ Windows 7 Ultimate SP1 X64 | 4/26/2012 |
SHA-256 
(BYTE-only) "VxBIOS Cryptographic Library provides HMAC cryptographic services for the SafeNet ProtectDrive Cryptographic Engine" 05/10/12: Updated vendor information; |
1753 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Iain Holness
|
Version 1.0 |
Intel Core 2 Duo w/ Microsoft Windows XP SP3; 3.0 GHZ Intel Pentium D Processor 830 (1CPU) w/ Microsoft Windows XP SP2; Intel Core 2 Duo w/ Windows 7 Ultimate SP1 X86 | 4/26/2012 |
SHA-1     
(BYTE-only) "SafeCGX Cryptographic Library provides cryptographic services for the SafeNet ProtectDrive Cryptographic Engine" |
1752 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Iain Holness
|
Version 1.0 |
Intel Core 2 Duo w/ MS Windows XP SP3; 3.0 GHZ Intel Pentium D Processor 830 (1CPU) w/ MS Windows XP SP2; Intel Core 2 Duo w/ Windows 7 Ultimate SP1 X86; Intel Core 2 Duo w / Windows 7 Ultimate SP1 X64 | 4/26/2012 |
SHA-1     
(BYTE-only) "NetBSD INIT Cryptographic Library provides cryptographic services for the SafeNet ProtectDrive Cryptographic Engine" 05/10/12: Updated vendor information; |
1751 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Iain Holness
|
Version 1.0 |
Intel Core 2 Duo w/ Microsoft Windows XP SP3; 3.0 GHZ Intel Pentium D Processor 830 (1CPU) w/ Microsoft Windows XP SP2; Intel Core 2 Duo w/ Windows 7 Ultimate SP1 X86 | 4/26/2012 |
SHA-256 
(BYTE-only) "CryptoAPI_NT Cryptographic Library provides cryptographic services for the SafeNet ProtectDrive Cryptographic Engine" 05/10/12: Updated vendor and implementation information; |
1750 | MikroM GmbH Dovestrasse 1 Berlin, Berlin 10587 Germany -Holger Krahn
-Michael Hagemeister
|
Version 16311 (Firmware) |
Xilinx Virtex-6 FPGA XC6VLX130T | 4/19/2012 |
SHA-1     
(BYTE-only) "MVC201 - Digital Cinema Image Media Block for integration into a TI Series 2 DLP Cinema projector" |
1749 | MikroM GmbH Dovestrasse 1 Berlin, Berlin 10587 Germany -Holger Krahn
-Michael Hagemeister
|
Version 15569 (Firmware) |
Freescale MCIMX515DJM8C | 4/19/2012 |
SHA-256 
(BYTE-only) "MVC201 - Digital Cinema Image Media Block for integration into a TI Series 2 DLP Cinema projector" |
1748 | MikroM GmbH Dovestrasse 1 Berlin, Berlin 10587 Germany -Holger Krahn
-Michael Hagemeister
|
Version fips-1.2.3 17302 (Firmware) |
Freescale MCIMX515DJM8C | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "MVC201 - Digital Cinema Image Media Block for integration into a TI Series 2 DLP Cinema projector" |
1747 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Palani Karuppan
|
Version 12.4(25e)JA (Firmware) Part # Freescale SC1023 |
Freescale SC1023 | 4/19/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
1746 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Palani Karuppan
|
Version 12.4(25e)JA (Firmware) |
Freescale SC1023 | 4/19/2012 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
1745 | Pulse Secure, LLC. 2700 Zanker Road, Suite 200 San Jose, CA 95134 USA -Yvonne Sang
|
Version 2.1 |
Intel Core 2 Duo E8400 3.0GHz w/ Microsoft Windows 7 SP1 (64-bit) | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Odyssey Security Component (OSC) (SW Version 2.1) is a software module that implements a set of cryptographic algorithms for use by a software application." 01/26/15: Updated vendor information; |
1744 | Kaseya US Sales, LLC 901 N. Glebe Road, Suite 1010 Arlington, VA 22203 USA -Bill Durant
|
Version 1.0 |
Intel Core 2 Duo w/ MAC OS X v10.6.8; Intel Core 2 Duo w/ Red Hat Enterprise Linux v5.5 32 bit; Intel Core 2 Duo w/ Red Hat Enterprise Linux v5.5 64 bit; Intel Core 2 Duo w/ Windows Server 2008; Intel Core 2 Duo w/ Windows 7 (32 bit); Intel Core 2 Duo w/ Windows 7 (64 bit) | 4/19/2012 |
SHA-256 
(BYTE-only) "The Kaseya IT Systems Management Platform uses encryption to secure communications between its client and server components. It is an ideal Systems Management solution for government systems and other infrastructures requiring a high assurance implementation." 04/27/12: Updated implementation information; |
1743 | Palo Alto Networks, Inc. 3300 Olcott Street Santa Clara, CA 95054 USA -Jake Bajic
-Lee Klarich
|
Version 4.0.10 (Firmware) |
Cavium Octeon MIPS64; Intel Multi Core Xeon | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series firewalls are multi-chip standalone modules that provide network security by enabling enterprises to see and control applications, users, and content using three unique identification technologies: App-ID, User-ID, and Content-ID." |
1742 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 3.12.9 |
Intel x86 (64-bit) w/ Red Hat Enterprise Linux 6.2 | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library provided by the Mozilla Foundation for general purpose cryptographic usage. The testing covers the cipher implementations found in the softtoken component of the NSS library." |
1741 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 3.12.9 |
AMD Opteron (64-bit) w/ Red Hat Enterprise Linux 6.2 | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library provided by the Mozilla Foundation for general purpose cryptographic usage. The testing covers the cipher implementations found in the softtoken component of the NSS library." |
1740 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
Intel Xeon Quad-Core (Westmere) | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data and content data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data." 10/17/12: Added new tested information; |
1739 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3 (Firmware) |
Intel Xeon Quad-Core (Westmere) | 4/19/2012 |
SHA-1     
(BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data and content data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data." |
1738 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 4.8.1 (Firmware) Part # 4.7 |
Intel® Pentium Dual-Core | 4/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host" |
1737 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Minda Zhang
|
Part # Armada PXA-610 |
N/A | 4/9/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Armada PXA-610 is an application processor SoC (http://www.marvell.com/application processors/armada-600/). It has a dedicated security hardware module, known as WTM, that runs secure firmware kernel to perform device trusted boot, access control, authentication, key management, DRM, disk encryption, and FIPS certified cryptographic operations." |
1736 | RSA, The Security Division of EMC 10700 Parkridge Blvd. Suite 600 Reston, VA 20191 US -Brian Girardi
|
Version 1.0 |
Intel Core i3 w/ Windows XP (32 bit); Intel Core i3 w/ Windows 7 (64 bit); Intel Xeon w/ CentOS 5.5 | 4/9/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The NetCSM provides encryption for all communications between RSA NetWitness services." |
1735 | Tendyron Corporation 1810, Tower B Jin-Ma Building 17 East Qing Hua Road, Haidian District Beijing, Beijing 100083 China -Blair Liang
|
Version 0.1.12 (Firmware) |
Zi8051 Secure Core, COS operating system version [DBFips-V0.1.12-120312-C000] | 4/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "SHA is recognized as one of the most secure hash algorithms. The input message can be irreversibly compressed into a shorter, fixed number of bits output sequence hash value. In the product, the byte-oriented SHA-1, SHA-256, SHA-384 and SHA-512 are implemented." |
1734 | TrellisWare Technologies, Inc. 16516 Via Esprillo, Suite 300 San Diego, CA 92127 USA -Chris Litvin
-Ryan Milne
|
Version Openssl 0.9.8m (Firmware) |
ARM Cortex A8 | 4/9/2012 |
SHA-256 
(BYTE-only) "Implementation of TrellisWare TopX Crypto and TrellisWare OpenSSL Crypto in the TW-230 (CheetahNet II) & TW-400 (Cheetah CUB) Radios." 04/19/12: Updated implementation information; |
1733 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA -Dave Riley
|
Version 02000001 (Firmware) |
ARM 7 TDMI | 4/9/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Pitney Bowes Cygnus X-3 Hardware Security Module (HSM) employs strong cryptographic and physical security techniques for the protection of funds in Pitney Bowes Postage systems." |
1732 | Curtiss-Wright Controls, Inc. 2600 Paramount Place, Suite 200 Fairborn, OH 45324 USA -Paul Davis
-Matt Young
|
Part # 1.11 |
N/A | 4/2/2012 |
SHA-256 
(BYTE-only) "The Flash Storage Module (FSM) AES cryptographic engine uses 256-bit encryption keys and performs real-time encryption of all data written to or read from solid state drives. The FSM cryptographic engines provides maximum data-at-rest security in commercial and military applications." |
1731 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 3.3(1)SG (Firmware) |
Freescale MPC8572E | 4/2/2012 |
SHA-512 
(BYTE-only) "IOS-XE Firmware image signing cryptographic implementations used within Cisco devices to provide image integrity." 08/03/12: Updated implementation information; |
1730 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version 3.3(1)SG (Firmware) |
Freescale MPC8572E | 4/2/2012 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "IOS-XE Firmware cryptographic implementations used within Cisco devices to provide cryptographic functions." 06/04/12: Added new tested information; |
1729 | Certicom Corp. 4701 Tahoe Blvd. Building A Missisauga, ON L4W 0B5 Canada -Certicom Sales
-Kris Orr
|
Version 6.0.2 |
64-bit Intel Core i5-2300 w/ Red Hat Linux 5.6; 64-bit Intel Core i5-2300 w/ Windows 7 | 3/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules." |
1728 | ClevX, LLC 9306 NE 125th Street Kirkland, WA 98034 USA -Simon Johnson
|
Version v1 (Firmware) |
Microchip 16LF1825 | 3/21/2012 |
SHA-256 
(BYTE-only) "Components are part of firmware of the iStorage datashur encrypted drive. A random number generator (RNG) is implemented consisting of a non-deterministic source of entropy that becomes the seed for the deterministic hash_DRBG algorithm. The RNG is used for creating encryption keys used in the AES hashing function implemented in a 2nd chip." |
1727 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Arnaud Lotigier
|
Version Version #11-M1005011+Softmask V04 (Firmware) (Firmware) |
Infineon SLE66CLX1280PE | 3/21/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This module is based on a Java Card platform (TOP DL V2) with 128K EEPROM memory available. The Cryptographic Module provides dual interfaces (i.e. contact and contact-less) where the same security level is achieved." |
1726 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 2.6.32-220.4.2.el6 |
Intel x86 w/ Red Hat Enterprise Linux 6.2 | 3/16/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel" |
1725 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 2.6.32-220.4.2.el6 |
AMD Opteron w/ Red Hat Enterprise Linux 6.2 | 3/16/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel" |
1724 | Diversinet Corp. 2235 Sheppard Avenue East Atria II Suite 1700 Toronto, Ontario M2J5B5 Canada -Salah Machani
-Hussam Mahgoub
|
Version 2.0 |
Qualcomm Snapdragon w/ Android OS v2.2 | 3/16/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Diversinet Java Crypto Module for Mobile is shipped with Diversinet MobiSecure Client SDK for Java based run-time environments on Smartphones and tablets including, Android OS-, BlackBerry OS- and Java ME MIDP-based. The Crypto Module implements several cryptography algorithms including Triple DES, AES, SHA, HMAC, DRBG and RSA." |
1723 | Diversinet Corp. 2235 Sheppard Avenue East Atria II Suite 1700 Toronto, Ontario M2J5B5 Canada -Salah Machani
-Hussam Mahgoub
|
Version 2.0 |
Intel Xeon E5530 w/ Windows Server 2008 RC2 (64bit) and JDK 1.6 | 3/16/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Diversinet Java Crypto Module is a JCA (Java Cryptography Architecture) Provider shipped with Diversinet MobiSecure Products. The Crypto Module implements several JCE (Java Cryptography Extension) algorithms including Triple DES, AES, SHA, HMAC, DRBG and RSA. The Crypto Module is packaged in a signed Java Archive (JAR) file." |
1722 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.2 |
Intel Xeon w/ SecureOS 8.2 running on VMware ESXi v4.1; Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.6.0; Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.9.0; Intel Xeon w/ SecureOS 8.3 running on VMware ESXi v5.0; Intel Xeon w/ SecureOS 8.3 running on Crossbeam XOS v9.9.0 | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Kernel Crypto Library for SecureOS® is a software library that provides cryptographic services for applications on the various deployments of McAfee''s Firewall Enterprise Virtual Appliance." 08/15/12: Added new tested information; |
1721 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 7.0.1.01 |
Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.6.0; Intel Xeon w/ SecureOS 8.2 running on VMware ESXi v4.1; Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.9.0 | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto Library for SecureOS® is a software library that provides cryptographic services for applications on the various deployments of McAfee''s Firewall Enterprise Virtual Appliance." 08/14/12: Added new tested information; |
1720 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 7.0.1.01 |
Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.6.0; Intel Xeon w/ SecureOS 8.2 running on VMware ESXi v4.1; Intel Xeon w/ SecureOS 8.2 running on Crossbeam XOS v9.9.0; | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto Library for SecureOS® is a software library that provides cryptographic services for applications on the various deployments of McAfee''s Firewall Enterprise Virtual Appliance." 08/14/12: Added new tested information; |
1719 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2 S4 (Firmware) |
Cavium Octeon | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 03/14/12: Updated implementation information; |
1718 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2 S4 (Firmware) |
Cavium Octeon | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 03/14/12: Updated implementation information; |
1717 | Thales e-Security Meadow View House Crendon Industrial Estate Long Crendon Aylesbury, Buckinghamshire HP18 9EQ U.K. -Datacryptor-Certifications
|
Version V1.2 (Firmware) |
Motorola Coldfire processor - single core | 3/12/2012 |
SHA-384 
(BYTE-only) "Thales e-Security implements this algorithm for bootstraps and applications running on its Secure Generic Sub System (SGSS) providing secure cryptographic resources to the Datacryptor® 2000 and the Datacryptor® Advanced Performance network encryption products for IP, Frame Relay and Link (including E1/T1) networks." 09/10/12: Updated vendor information; |
1716 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2 S4 (Firmware) |
Cavium Octeon | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router IPSec designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." 03/14/12: Updated implementation information; |
1715 | Juniper Networks, Inc. 1194 North Matilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2 S4 (Firmware) |
Cavium Octeon | 3/12/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router IPSec designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." 03/14/12: Updated implementation information; |
1714 | Hagiwara Solutions Co., Ltd. 2-5-12 Nishiki Naka-ku, Nagoya, Aichi 460-0003 Japan -Yoshihiro Kito
-Masaki Takikawa
|
Version 1.0 (Firmware) Part # HS200S-F |
HS200S-F | 3/7/2012 |
SHA-256 
(BYTE-only) "The TRUESSD Crypto Engine is the hardware-based data encryption and decryption engine. This cryptographic engine provides the secure data protection found in Hagiwara Solutions storage products." |
1713 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 3.0.0.15 |
Intel Celeron M(Dothan) w/ NetBSD 2.1; PMC Sierra RM7035C w/ NetBSD 2.1 | 3/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." 03/21/12: Added new tested information; |
1712 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.0 build 47235 |
Intel Xeon w/ Virtual Appliance based on: SLES 11 SP1 for Vmware; AMD Opteron w/ Virtual Appliance based on: SLES 11 SP1 for Vmware | 1/11/2012 |
SHA-1     
(BYTE-only) "The VMware vCenter Server Virtual Appliance Cryptographic engine provides the cryptographic services to VMware''s vCenter Server Virtual Appliance application." |
1711 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.28.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 2/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size and covers the AES NI Intel support." |
1710 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.28.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 2/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size and covers the AES NI Intel support." |
1709 | iDirect Technologies, Inc. 13865 Sunrise Valley Drive Suite 100 Herndon, VA 20171 USA -Paul Harr
-Karl Fuchs
|
Version 2.3.1 (Firmware) |
Intel IXP465 | 2/29/2012 |
SHA-1     
(BYTE-only) "iDirect''s AES-based bidirectional link encryption and TRANSEC DVB-S2 feature, combined with other system features such as cutting-edge coding techniques, acceleration and compression provides a fully integrated IP networking solution where security, performance and bandwidth efficiency are critical." |
1708 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Chela Diaz de Villegas
-David Gerendas
|
Version 1.1 |
Intel Core i5 w/ 32-bit Windows XP; Intel Xeon (3xxx) w/ 64-bit Windows Server 2008 R2; Intel Xeon (3xxx) w/ 64-bit Windows Server 2003; Intel Xeon (3xxx) w/ 32-bit Windows Server 2003; Intel Core i5 w/ 64-bit Windows 7; Intel Core i5 w/ 32-bit Windows 7; Intel Core i5 w/ 64-bit Windows Vista; Intel Core i5 w/ 32-bit Windows Vista | 2/29/2012 |
SHA-512 
(BYTE-only) "The McAfee Application Control/Change Cryptographic Engine v1.1 provides secure hashing and file integrity monitoring services for McAfee Application Control and Change Control products." |
1707 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Michael Bruyere
-Anthony Vella
|
Version 1.2 (Firmware) |
NXP P5Cx081 Family | 2/29/2012 |
SHA-384 
(BYTE-only) SHA-512  (BYTE-only) "MultiApp V2.1 is a highly secured smartcard platform conformant to the Javacard 2.2.2 and GP 2.1.1 standards, designed to operate on the NXP P5Cx081 family, inclusive of NXP P5CC081 and P5CC145 integrated circuits. Its cryptographic library implements TDEA, AES, SHA, RSA, RSA CRT, ECDSA, ECC CDH and RNG ANSX9.31 algorithms. " |
1706 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Michael Bruyere
-Anthony Vella
|
Version 1.2 (Firmware) Part # NXP P5Cx081 Family |
NXP P5Cx081 Family | 2/29/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "MultiApp V2.1 is a highly secured smartcard platform conformant to the Javacard 2.2.2 and GP 2.1.1 standards, designed to operate on the NXP P5Cx081 family, inclusive of NXP P5CC081 and P5CC145 integrated circuits. Its cryptographic library implements TDEA, AES, SHA, RSA, RSA CRT, ECDSA, ECC CDH and RNG ANSX9.31 algorithms." |
1705 | NEC Display Solutions, Ltd. Mita Kokusai Building 4-28, Mita 1-chome Minato-ku, Tokyo 108-0073 Japan -Michio Yoshino
|
Version 1.011 (Firmware) |
Xilinx Virtex-5 FPGA | 2/29/2012 |
SHA-1     
(BYTE-only) "Image Media Block" |
1704 | NEC Display Solutions, Ltd. Mita Kokusai Building 4-28, Mita 1-chome Minato-ku, Tokyo 108-0073 Japan -Michio Yoshino
|
Version 1.1.2 (Firmware) |
AMCC PowerPC 440 | 2/29/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Image Media Block" |
1703 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Michael Williamson
-Farzam Tajbakhsh
|
Version 12.3.03 (Firmware) |
Freescale MPC8572E | 2/23/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Our Goal is to receive FIPS 140-2 SL2 certification on the above platforms. For this, we have identified the cryptographic boundary to be the management module (with access to E2PROM on backplane). The software is to be updated to use NSS/NSPR as the cryptographic engine." |
1702 | Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 USA -Jun Wang
|
Version 1.0 |
Dell Latitude E6400 w/ Cent OS 5 | 2/23/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A C++ based library to provide cryptographic functionality for C++ applications." |
1701 | Websense, Inc. 10240 Sorrento Valley Road San Diego, CA 92121 USA -Joshua Rosenthol
|
Version 1.0 |
Intel Xeon w/ Windows Server 2008 R2 (64-bit) with JRE v1.6.0 | 2/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Websense Crypto Module Java provides cryptographic and secure communication services for the Websense-developed family of web security, email security, and data loss prevention solutions, deployed on high-performance, pre-configured hardware or as fully-customizable "ready-to-install" software." |
1700 | Entrust, Inc. One Lincoln Centre 5400 LBJ Freeway Suite 1340 Dallas, TX 75240 USA -Entrust Sales
|
Version 8.0 |
Intel Core 2 Duo E8400 w/ Microsoft Windows Server 2008 R2 with Oracle J2RE 6; Intel Core 2 Duo E8400 w/ Microsoft Windows Server 2008 R2 with Oracle J2RE 7 | 2/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11, is used as the interface to hardware-based cryptographic modules." |
1699 | FRAMA AG Unterdorf Lauperswil, Bern CH-3438 Switzerland -Beat Waelti
|
Version V2.0.4 (Firmware) Part # FRM-II Version 1.2 |
firmware: running on built-in Fujitsu MB91302APM1R micro controller | 2/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines." |
1698 | Open Source Software Institute 8 Woodstone Plaza, Suite 101 Hattiesburg, MS 39402 USA -John M Weathersby, Jr.
|
Version 1.2.3 |
Freescale PowerPC-32 w/ Wind River 4.0 using Linux kernel 2.6.34; Freescale PowerPC-32 w/ Wind River 1.4 using Linux kernel 2.6.27 | 2/21/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website. It has been tested with both assembler optimization and without assembler optimization." |
1697 | Certes Networks Inc 300 Corporate Center Drive Suite 140 Pittsburgh, PA 15108 USA -Todd Cignetti
-Kevin Nigh
|
Version 2.1 (Firmware) |
NetLogic XLS; NetLogic XLR; NetLogic XLP | 2/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Certes Networks CEP-VSEs are high performance enforcement points offering variable speed encryption and authentication from 3 Mbps-10Gbps. Policies are defined in a centralized management solution. Roles are assigned for policy control and device management. CEP-VSEs encrypt at Layers 2, 3 or 4 in a way that is transparent to the network." |
1696 | Websense, Inc. 10240 Sorrento Valley Road San Diego, CA 92121 USA -Joshua Rosenthol
|
Version 1.0 |
64-bit Intel Xeon w/ 64-bit Windows2008 R2; 64-bit Intel Xeon w/ 32-bit Red Hat Enterprise Linux 6 | 2/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Websense produces a family of web, e-mail, and data security solutions that can be deployed on pre-configured security-hardened hardware or as customer installable software. The Websense Crypto Module C provides support for cryptographic and secure communications services for these solutions." |
1695 | Motorola Mobility, Inc. 600 North US Highway 45 Libertyville, IL 60048 USA -Ed Simon
|
Version 5.4fm |
ARMv7 w/ Android 2.3; ARMv7 w/ Android 4.0 | 2/7/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Motorola Mobility cryptographic module is used for application level data encryption on Android-based devices." 05/14/12: Added new tested information; |
1694 | Hewlett Packard Development Company, L.P. 4209 Technology Drive Fremont, CA 94538 USA -Kurt Heberlein
|
Version 3.1.1.MU1 |
Intel Quad Core 2.8GHz w/ Gnu/Linux (Debian)5.0.2_libcrypto (OpenSSL); Intel Quad Core 2.8GHz w/ Gnu/Linux (Debian)5.0.2_libgcrypt (GNUTLS); | 1/26/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "InFormOS is built on a hardened base of Debian Linux with proprietary extensions, and utilizes standard versions of libcrypto (OpenSSL) and libgcrypt (GNUTLS) for crypto operations." 04/02/12: Added new tested information; |
1693 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version OpenSSL-fips-2.0-test-20110925 |
Freescale MPC8347 w/ Linux 2.6.36 | 1/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "All cryptographic implementations are in software by way of OpenSSL, whose version is 1.1.0-SNAP-20110615." 11/01/12: Updated vendor information; |
1692 | Hewlett-Packard Company 153 Taylor Street Littleton, MA 01460 USA -Boby Joseph
|
Version 5.2 |
RMI(Netlogic) XLS408 w/ Comware V5.2; Freescale MPC8544 w/ Comware V5.2; Freescale MPC8349 w/ Comware V5.2; Broadcom BCM5836 w/ Comware V5.2; Broadcom BCM112X w/ Comware V5.2 | 1/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Comware cryptographic library is a software library that provides cryptographic functions within HP devices." |
1691 | LogLogic, Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 USA -Chima Njaka
-Phuong Hoang
|
Version 1.0 |
Intel Xeon w/ Oracle Enterprise Linux v5.6 | 1/26/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Communications Cryptographic Module establishes a secure, encrypted tunnel between LogLogic appliances for the secure transmission of log data." 02/17/12: Updated implementation information; |
1690 | WinMagic Inc. 200 Matheson Blvd. West Suite 201 Mississuaga, Ontario L5R 3L7 Canada -Alexander Mazuruc
-Garry McCracken
|
Version 6.1 |
Intel Core i5 2450M w/ Windows 7 64-bit; Intel Core 2 Duo w/ Mac OS X 10.7.2 64-bit | 1/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SecureDoc Cryptographic Library implements cryptographic algorithms for SecureDoc Cryptographic Module. This Module is utilized by SecureDoc encryption software that delivers full disk encryption and other data protection solutions for General Purpose Computers, laptops and removable media." |
1689 | Entrust, Inc. One Lincoln Centre 5400 LBJ Freeway Suite 1340 Dallas, TX 75240 USA -Entrust Sales
|
Version 8.1sp1 |
Intel Core 2 Duo E8400 w/ Windows Server 2008 R2 Enterprise Edition | 1/19/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Security Kernel is a C++ implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware or both. The industry standard Cryptoki API from PKCS #11, is used as the interface to hardware-based cryptographic modules." |
1688 | Catbird Networks, Inc. 1800 Green Hills Road, Suite 113 Scotts Valley, CA 95066 USA -Michael Berman
|
Version v1.0 |
Intel Core i5 with AES-NI w/ CentOS 6.0 | 1/19/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic module used by Catbird''s comprehensive security and compliance solutions for virtualized data centers." 01/25/12: Updated implementation information; |
1687 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.0 build 455964 |
Intel Core i5 w/ Microsoft Windows 7 SP1 64 bit; AMD Athlon w/ Microsoft Windows 7 SP1 64 bit | 1/5/2012 |
SHA-1     
(BYTE-only) "The VMware vSphere Client Cryptographic Engine provides the cryptographic services to VMware''s vSphere Client application." |
1686 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.0 build 422456 |
Intel Xeon w/ Microsoft Windows Server 2008 SP2 64 bit; AMD Opteron w/ Microsoft Windows Server 2008 SP2 64 bit | 1/5/2012 |
SHA-1     
(BYTE-only) "The VMware vCLI Cryptographic Engine provides the cryptographic services to VMware''s vCLI." |
1685 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.0 build 469512 |
Intel Xeon. w/ 64 bit VMware ESXI; AMD Opteron w/ 64 bit VMware ESXI | 1/5/2012 |
SHA-1     
(BYTE-only) "The VMware ESXI Cryptographic Engine provides the cryptographic services to VMware''s ESXI server product.." |
1684 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 5.0 build 455964 |
Intel Core i3 w/ Windows Vista SP2 64 bit; AMD Athlon w/ Windows Vista SP2 64 bit | 1/5/2012 |
SHA-1     
(BYTE-only) "The VMware vCenter Server Java Cryptographic Engine provides the cryptographic services to VMware''s vCenter Server product." |
1683 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
-Luis Chirinos
|
Version 4.1 |
Intel Xeon w/ CGLinux | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
1682 | ClevX, LLC 9306 NE 125th Street Kirkland, WA 98034 USA -Simon Johnson
|
Version v1 (Firmware) |
Microchip 16LF1825 | 12/29/2011 |
SHA-256 
(BYTE-only) "Components are part of firmware that make up the SDG family of encrypted drives. A random number generator (RNG) is implemented consisting of a non-deterministic source of entropy that becomes the seed for the deterministic hash_DRBG algorithm. The RNG is used for creating encryption keys used in the AES hashing function implemented in a 2nd chip." |
1681 | Cummings Engineering Consultants, Inc. 145 S. 79th St., Suite 26 Chandler, AZ 85226 USA -Darren Cummings
|
Version v1.0 |
TI OMAP 3 w/ Linux 3.0.4; Intel Pentium T4200 w/ Android 2.2; Qualcomm QSD 8250 w/ Android 2.2; Intel Pentium T4200 w/ Ubuntu 10.04; Intel Celeron (64 bit mode) w/ Microsoft Windows 7; Intel Core i5 (with AES-NI) w/ Android 2.2; Intel Core i5 (with AES-NI) (64 bit mode) w/ Microsoft Windows 7; Intel Core i5 (with AES-NI) w/ Fedora 14 | 1/26/2012 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic module used by the Cummings Engineering suite of products which allow for efficient and effective deployment of robust secure communications capability on commercial off the shelf (COTS) devices, such as Smartphones and Tablets, as well as speciality communications devices." 02/01/12: Added new tested information; |
1680 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.20.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
1679 | SUSE Linux Products GmbH Maxfeldstr. 5 Nuremberg, 90409 Germany -Roman Drahtmüller
|
Version 0.9.8j-0.20.1 |
Intel x86-64 w/ SUSE Linux Enterprise Server 11 SP2 | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
1678 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 6.0 |
Intel T7300 Core 2 Duo w/ Android 2.2 ARM (32-bit) JRE 6.0; AMD Athlon 64 X2 Dual-Core Processor 3800+ w/ Microsoft Windows 7 (64-bit) with Sun JRE 6.0 | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" 01/05/12: Updated implementation information; |
1677 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
-Ryan W. Maple
|
Version 2.6.36.1+xcd01 (Firmware) |
Intel Xeon E5645; Intel Core 2 Duo | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''s." |
1676 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
-Ryan W. Maple
|
Version 1.2+5.2.1.1 (Firmware) |
Intel Xeon E5645; Intel Core 2 Duo | 12/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''s." |
1675 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Robert Relyea
|
Version 3.12.9.1 |
Intel Core i7 w/ Red Hat Enterprise Linux v6.2 64-bit; Intel Core i7 with AES-NI w/ Red Hat Enterprise Linux v6.2 64-bit; Intel Core i7 w/ Red Hat Enterprise Linux v6.2 32-bit | 1/19/2012 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/." 01/26/12: Updated implementation information; |
1674 | Q1 Labs 890 Winter Street, Suite 230 Waltham, MA 02451 USA -Ellen Knickle
-Peter Clark
|
Version 1.0 |
Intel Xeon w/ CentOS 5.7; Intel Xeon w/ RHEL 5.7 | 12/16/2011 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Q1 Labs Cryptographic Security Kernel is a multi-algorithm library providing general-purpose cryptographic services. The module provides a single, FIPS-Approved API for cryptography allowing for centralized FIPS mode status, logging, and reporting." |
1673 | Fiber Logic Communications, Inc. 5F-3, No.9 Prosperity Road One, Science-Park Hsinchu City, 408 TAIWAN -Jun Tseng
|
Version 1.00.00 (Firmware) |
AMCC PowerPC | 12/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FiberLogic Cryptographic Library #1 provides cryptographic functionality for data integrity, digital signature and secure network traffic." |
1672 | GOTrust Technology Inc. 10F-1, No.306, Sec. 1, Wenxin Rd., Nantun Dist. Taichung City, 408 Taiwan -Jerry Lin
|
Version 1.0 (Firmware) |
ARM SecurCore SC300 | 12/16/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The GO-Trust Cipher Library is designed to provide FIPS140-2 algorithm support for the GO-Trust SDencrypter Cryptographic Module. This module supports GO-Trust applications (for example: KingCall and KingText) by providing validated Cryptographic Services. The incorporation of these algorithms makes these products ideal for enterprise and governmen" 10/16/15: Added new tested information; |
1671 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada -Chris Brych
-Laurie Smith
|
Version 4.8.7 (Firmware) |
StrongARM II 80219 | 12/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1670 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version R02.01.00 (Firmware) Part # 51009397004 |
Motorola PIKE2 51009397004 | 12/16/2011 |
SHA-384 
(BYTE-only) "The PIKE2 cryptographic processor is used in security modules embedded in Motorola Solutions security products." 12/23/11: Updated implementation information; |
1669 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.3 (Firmware) |
Intel Xeon; Intel Xeon LC series; Intel Xeon L Series; Intel Core 2 Duo; Intel Celeron; ARM V5 Compatible SOC; Intel EP80579 | 12/16/2011 |
SHA-1     
(BYTE-only) "This focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library 4.3 running on Intel Xeon." 12/23/11: Added new tested information; |
1668 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.3 (Firmware) |
Intel Xeon; Intel Xeon LC series; Intel Xeon L series; Intel Core 2 Duo; Intel Celeron; ARM v5 Compatible SoC; Intel EP80579 | 12/16/2011 |
SHA-1     
(BYTE-only) "This focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library 4.3 running on Intel Xeon." 12/23/11: Added new tested information; |
1667 | Motorola Mobility, Inc. 600 North US Highway 45 Libertyville, IL 60048-5343 USA -Stuart Kreitzer
|
Version AG01.04 (Firmware) Part # OMAP4 |
TI OMAP4 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "The Motorola Mobility Cryptographic Module is a hybrid multi-chip module comprised of both software and hardware. The module boundary contains AES and SHA cryptographic hardware accelerators and software driver libraries running on a Texas Instruments OMAP4 applications processor." |
1666 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
-Luis Chirinos
|
Version 4.1 (Firmware) |
Intel Xeon E5540 2.53GHz Quad Core; Intel Celeron E3400 2.60GHz Dual Core; | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
1665 | Covia Labs 465 Fairchild Dr. Suite 130 Mountain View, CA 94043 USA -Bruce Bernstein
|
Version 2.0 |
Intel Pentium 4 w/ Ubuntu Linux version 11; AMD E-350 w/ Red Hat Enterprise Linux version 5.8 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cccmLib is a dynamically linked library whose sole use is to serve as a cryptographic engine to the Covia Labs Connector application. In particular the cccmLib will provide the underlying functionality needed to implement secured communications and an encrypted file system." 08/21/12: Added new tested information; |
1664 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-20.el6 |
AMD Opteron w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
1663 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-20.el6 |
AMD Opteron w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
1662 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-9.el6_2.2 |
Intel x86 w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 64bit word size." 04/19/12: Updated implementation information; |
1661 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-9.el6_2.2 |
AMD Opteron w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 32bit word size." 04/23/12: Updated implementation information; |
1660 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-9.el6_2.2 |
AMD Opteron w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 64bit word size." 04/23/12: Updated implementation information; |
1659 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-20.el6 |
Intel x86 w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
1658 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-20.el6 |
Intel x86 w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
1657 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-9.el6_2.2 |
Intel x86 w/ Red Hat Enterprise Linux 6.2 | 12/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 32bit word size." 04/19/12: Updated implementation information; |
1656 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Wendi Ittah
-Tammy Green
|
Version 1.12.1 (Firmware) |
AMD Opteron Shanghai Quad Core; Intel P4 Xeon w/ SGOS v5.5; Intel Celeron w/ SGOS v5.5 | 12/13/2011 |
SHA-1     
(BYTE-only) "The SGOS 5.5 is a proprietary operating system developed specifically for use on a series of hardware appliances that serve as an Internet proxy and Wide Area Network (WAN) optimizer. The series of appliances supported are 510 Series, 810 Series, and 9000 Series." |
1655 | OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 27101 USA -Steve Marquess
|
Version 2.0 |
Qualcomm QSD 8250 (HTC Desire; ARMv7) w/ Android 2.2; Qualcomm QSD 8250 (Dell Streak; ARMv7) w/ Android 2.2; Intel Itanium 2 (64 bit mode) w/ HP-UX 11i; Intel Itanium 2 (32 bit mode) w/ HP-UX 11i; Freescale PowerPC32-e300 w/ Linux 2.6.33; TI OMAP 3530 (ARMv7) w/ Android 2.2; Intel Pentium (R) T4200 w/ Ubuntu 10.04; ARM Limited ARM922T (ARMv4) w/ uCLinux 0.9.29; NVIDIA Tegra 250 T20 (Motorola Xoom, ARMv7) w/ Android 3.0; Intel Core i5 with AES-NI (64 bit mode) w/ Fedora 14; Intel Core i5 with AES-NI (32 bit mode) w/ Ubuntu 10.04; Intel Celeron (32 bit mode) w/ Microsoft Windows 7; TI TNETV1050 w/ VxWorks 6.8; PowerPC e300c3 w/ Linux 2.6.27; Intel Pentium T4200 (64 bit mode) w/ Cascade Server 6.10; Intel Pentium T4200 (32 bit mode) w/ Cascade Server 6.10; Intel Pentium 4 (64 bit mode) w/ Microsoft Windows 7; TI AM3703CBP w/ Linux 2.6.32; Broadcom BCM11107 (ARMv6) w/ Linux 2.6;TI TMS320DM6446 (ARMv7) w/ Linux 2.6; Intel Xeon 5675 (x86) with AES-NI (32 bit mode) w/ Oracle Solaris 11; Intel Xeon 5675 (x86) (64 bit mode) w/ Oracle Solaris 11; Intel Pentium T4200 (x86) (32 bit mode) w/ Ubuntu 10.04; Intel Xeon 5675 (x86) (32 bit mode) w/ Oracle Solaris 11; Intel Xeon 5675 (x86) with AES-NI (64 bit mode) w/ Oracle Solaris 11; Intel Pentium T4200 (x86) (64 bit mode) w/ Ubuntu 10.04; SPARC-T3 (SPARCv9) (32 bit mode) w/ Oracle Solaris 10; SPARC-T3 (SPARCv9) (64 bit mode) w/ Oracle Solaris 10; Intel Xeon 5675 (x86) (64 bit mode) w/ Oracle Linux 5; Intel Xeon 5675 with AES-NI (64 bit mode) w/ Oracle Linux 5; Intel Xeon 5675 (64-bit mode) w/ Oracle Linux 6; Intel Xeon 5675 with AES-NI (64-bit mode) w/ Oracle Linux 6; SPARC-T3 (SPARCv9) (32-bit mode) w/ Oracle Solaris 11; SPARC-T3 (SPARCv9) (64-bit mode) w/ Oracle Solaris 11; NVIDIA Tegra 250 T20 (ARMv7) w/ Android 4.0; Freescale PowerPC-e500 w/ Linux 2.6; TI C64x+ w/ DSP Media Framework 1.4; TI OMAP 3 (ARMv7) with NEON w/ Android 4.0 | 11/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/." 12/14/11: Updated implementation information; |
1654 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -David Gerendas
|
Version 6.1.3 |
Intel Core i3 w/ Windows XP 32-bit; Intel Core i3 w/ Windows 7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 32-bit; Intel Core i5 with AES-NI w/ Windows Vista 32-bit; Intel Core i7 with AES-NI w/ Windows 7 64-bit; Intel Core i7 with AES-NI w/ Windows Vista 64-bit; Intel Core i7 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i5 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i3 w/ McAfee Endpoint Encryption Preboot OS | 11/29/2011 |
SHA-256 
(BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Endpoint Encryption product range." 12/07/11: Updated implementation information; |
1653 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -David Gerendas
|
Version 6.1.3 |
Intel Core i3 w/ Windows XP 32-bit; Intel Core i7 with AES-NI w/ Windows Vista 64-bit; Intel Core i5 with AES-NI w/ Windows Vista 32-bit; Intel Core i7 with AES-NI w/ Windows 7 64-bit; Intel Core i3 w/ Windows 7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 32-bit; Intel Core i7 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i5 with AES-NI w/ McAfee Endpoint Encryption Preboot OS; Intel Core i3 w/ McAfee Endpoint Encryption Preboot OS | 11/29/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Endpoint Encryption product range." |
1652 | Hewlett-Packard Company 8000 Foothills Boulevard Roseville, CA 95747 USA -Sunnil Amanna
|
Version 5.3.1 |
ARM 11 core w/ Integrity 5.0 | 11/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Standard operating software for W*-platform switch product." 12/01/11: Updated implementation information; |
1651 | Crossbeam Systems, Inc. 80 Central Street Boxborough, MA 01719 USA -Carole Hunt
-Dave Schiff
|
Version 1.4.4 (Firmware) |
Intel Xeon | 11/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Libgcrypt provides cryptographic implementations used by libvirt, a library that offers virtualization support for the module." 12/22/11: Updated implementation information; |
1650 | Crossbeam Systems, Inc. 80 Central Street Boxborough, MA 01719 USA -Carole Hunt
-Dave Schiff
|
Version 0.9.8e (Firmware) |
Intel Xeon | 11/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OpenSSL provides the cryptographic implementations used in the SSH functionality provided by the module." 12/22/11: Updated implementation information; |
1649 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 1.0 (Firmware) |
Renesas AE-5 Series Processor | 11/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HiCOS PKI Native Smart Card supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, RSA 1024/2048 encrypt/decrypt, RSA digital signature generation/verification and APDU command/response encryption and/or MAC." |
1648 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Wendi Ittah
-Tammy Green
|
Version 2.1.1 (Firmware) |
AMD Opteron Shanghai Quad Core; Intel Xeon Lynnfield X3450 Quad Core; Intel Clarkdale i3-540 Dual Core; Intel Clarkdale G1101; Intel P4 Xeon; VIA Nano; Intel Celeron; AMD Opteron Istanbul 6 Core processor | 11/17/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SGOS 6.1 is a proprietary operating system developed specifically for use on a series of hardware appliances that serve as an Internet proxy and Wide Area Network (WAN) optimizer. The series of appliances supported are 510 Series, 600 Series, 810 Series, 900 Series and 9000 Series." 01/30/12: Made correction to the implementation information; |
1647 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 1.0 (Firmware) Part # 294.010 |
PS2251-85 | 11/17/2011 |
SHA-256 
(BYTE-only) "The Imation Secure Flash Drive includes a high-speed hardware-based AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, HMAC, SHA, and DRBG algorithms." 11/22/11: Updated vendor information; |
1646 | IBM z/VM Design and Development 1701 North Street Building 250-2 Endicott, NY 13760 U.S. -Brian W. Hugenbruch
|
Version 6.1 plus APAR PM43382 Part # 5741-A08 |
System z10 Enterprise Class processor w/ IBM z/VM V6.1 | 11/17/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files." |
1645 | Apple Inc. 11921 Freedom Drive Reston, VA 20190 USA -Shawn Geddis
-Ruben Brochner
|
Version v1.1 |
Intel® Core 2 Duo w/ Mac OS X v10.7.0 | 11/17/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Apple''s OS X Lion (v10.7) security services are now built on a newer ''Next Generation Cryptography'' platform and does not use the CDSA/CSP module previously validated. Apple is re-validating the same CDSA/CSP module under OS X Lion to provide validation solely for third-party applications." |
1644 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 1.0.0c (Firmware) |
Intel Xeon Nehalem; Intel Celeron; Intel Core 2 Duo | 11/17/2011 |
SHA-1     
(BYTE-only) "SonicWALL SRA EX6000, SRA EX7000 and SRA EX9000 are part of the SonicWALL Enterprise product family. They provide hardware appliance based SSL VPN Virtual Private Network remote access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS and Google Android among others." |
1643 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 1.6.0u20 (Firmware) |
Intel Xeon Nehalem; Intel Celeron; Intel Core 2 Duo | 11/17/2011 |
SHA-1     
(BYTE-only) "SonicWALL SRA EX6000, SRA EX7000 and SRA EX9000 are part of the SonicWALL Enterprise product family. They provide hardware appliance based SSL VPN Virtual Private Network remote access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS and Google Android among others." |
1642 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 1.0.0c (Firmware) |
Intel Xeon Nehalem (AES-NI); Intel Celeron; Intel Core 2 Duo | 11/17/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SonicWALL SRA EX6000, SRA EX7000 and SRA EX9000 are part of the SonicWALL Enterprise product family. They provide hardware appliance based SSL VPN Virtual Private Network remote access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS and Google Android among others." |
1641 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Jim Sweeny
|
Version OA36882 Part # 5694-A01 |
IBM zEnterprise 196 (z196) w/ IBM z/OS® V1.13 | 11/9/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services." 11/15/11: Update implementation information; |
1640 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA36775 |
IBM zEnterprise 196 w/ IBM z/OS® V1.13 | 11/9/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens." |
1639 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA36775 Part # 5694-A01 |
IBM zEnterprise 196 w/ IBM z/OS® V1.13 | 11/9/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and" |
1638 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
-Luis Chirinos
|
Version 1.0 |
CGLinux w/ Intel Xeon | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
1637 | Centrify Corporation 785 N Mary Avenue Suite 200 Sunnyvale, CA 94085 USA -Keith Moreau
|
Version 1.0 |
Intel Core i7 2GHz w/ Mac OS 10.7 | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Centrify Cryptographic Module provides the cryptographic services for all of Centrify''s products." |
1636 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Chris Brych
-Iain Holness
|
Version 3.20.00 (Firmware) |
StrongARM 80219 | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet PSI-e provides a wide range of cryptographic functions." 11/03/11: Update implementation information; |
1635 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Part # CP-7 |
N/A | 10/31/2011 |
SHA-1     
(BYTE-only) "FortiOS in combination with FortiGate appliances provide enterprise-class protection against network, content, and application-level threats. FortiOS provides integrated firewall, VPN, antivirus, antispam, intrusion prevention, content filtering and traffic shaping and HA capabilities." 01/19/12: Updated implementation information; |
1634 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3(Firmware) |
Intel Xeon E Series | 10/31/2011 |
SHA-1     
(BYTE-only) "FortiOS in combination with FortiGate appliances provide enterprise-class protection against network, content, and application-level threats. FortiOS provides integrated firewall, VPN, antivirus, antispam, intrusion prevention, content filtering and traffic shaping and HA capabilities." 04/09/12: Updated implementation information; |
1633 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 MR3(Firmware) |
Intel Xeon E Series | 10/31/2011 |
SHA-1     
(BYTE-only) "FortiOS in combination with FortiGate appliances provide enterprise-class protection against network, content, and application-level threats. FortiOS provides integrated firewall, VPN, antivirus, antispam, intrusion prevention, content filtering and traffic shaping and HA capabilities." 04/09/12: Updated implementation information; |
1632 | Hewlett-Packard (TippingPoint) 14231 Tandem Boulevard Austin, TX 78728 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.2.1.1639 (Firmware) |
NetLogic XLR | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint S6100N Intrusion Prevention System (IPS) operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded." |
1631 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.4.5 (Firmware) |
RMI-XLS204; RMI-XLS408; RMI-XLR508; RMI-XLR516; RMI-XLR532; RMI-XLR7300 | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Aruba Networks'' Mobility Controller system completely changes how 802.11 networks are deployed, secured, and managed. The only mobile security system with an integrated ICSA-certified stateful firewall and hardware-based encryption, the Aruba mobility controller is the industry''s highest performing and most scalable enterprise mobility platform." 07/15/13: Updated implementation information; |
1630 | Motorola Solutions, Inc. One Motorola Plaza Holtsville, NY 11742-1300 USA -Tom Mckinney
|
Version 1.00.0.0.1 |
ARM 11 processor, MSM 7627 w/ Window Mobile 6.5, OS OEM Version 2.31.0002 | 10/31/2011 |
SHA-1     
(BYTE-only) "Motorola Wireless Fusion Cryptographic Module is a component of Motorola Wireless Mobile Computing devices that are equipped with a WLAN radio. These devices are used for business process automation applications in a number of vertical markets like retail, manufacturing, transportation, health and government" 11/01/11: Update implementation information; |
1629 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.2.3 (Firmware) |
Atheros AR5312; IDT79RC32434; Atheros AR7242; Atheros AR7161; Cavium Networks Octeon Plus CN5010; Marvell 88F6560; RMI- XLS204; RMI- XLS408; RMI- XLR508; RMI- XLR516; RMI- XLR532; RMI- XLR7300 | 10/31/2011 |
SHA-1     
(BYTE-only) "Aruba''s single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
1628 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.4.5 (Firmware) |
Atheros AR5312; IDT79RC3234; Atheros AR7242; Atheros AR7161; Cavium Networks Octeon Plus CN5010; Marvell 88F6560 | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Aruba Networks'' Mobility Controller system completely changes how 802.11 networks are deployed, secured, and managed. The only mobile security system with an integrated ICSA-certified stateful firewall and hardware-based encryption, the Aruba mobility controller is the industry''s highest performing and most scalable enterprise mobility platform." 07/15/13: Updated implementation information; |
1627 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.4.5 (Firmware) |
RMI-XLR7300; RMI-XLR532; RMI-XLR516; RMI-XLR508; RMI-XLS408; RMI-XLS204; Marvell 88F6560; Cavium Networks Octeon Plus CN5010; Atheros AR7161; Atheros AR7242; IDT79RC3234; Atheros AR5312 | 10/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Aruba''s single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." 07/15/13: Updated implementation information; |
1626 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.2.3 (Firmware) |
IDT79RC3234; Atheros AR5312 | 10/31/2011 |
SHA-1     
(BYTE-only) "Aruba''s single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
1625 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Robbie Gill
-Glen Beasley
|
Version 6.1.2.3 (Firmware) |
IDT79RC3234; Atheros AR5312; Marvell 88F6560; Atheros AR7161; Atheros AR7242; | 10/31/2011 |
SHA-1     
(BYTE-only) "Aruba''s single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." 11/22/11: Added new tested information; |
1624 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Chris Brych
-Iain Holness
|
Version 2.08.00 (Firmware) |
Intel 80219 (ARM V5T) | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet PSG Firmware provides a wide range of cryptographic functions." |
1623 | NetLogic Microsystems, Inc. 3975 Freedom Circle Santa Clara, CA 95054 USA -Mark Litvack
|
Part # A2 |
N/A | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "XLP multi-core processors offer full cache coherency and can deliver an unprecedented 160Gbps throughput and 240 million packets-per-second of application performance for next-generation 3G/4G mobile wireless infrastructure, enterprise, storage, security, metro Ethernet, edge and core infrastructure network applications." |
1622 | InZero Systems 13755 Sunrise Valley Drive, Suite 750 Herndon, VA 20171 USA -Warren Brown
-Al Donaldson
|
Version 2.80.0.38 (Firmware) |
PowerQUICC MPC8349EA | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The InZero XB2CUSB3.1 Series Gateways protect Windows PCs and their data. Each Gateway provides a hardware application sandbox for protected browsing and document viewing, firewall, proxy servers, and SSL-based Virtual Private Networks in a portable, pocket-sized appliance." 09/10/12: Updated implementation information; |
1621 | Research in Motion 295 Philip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 2.0.0.10 |
Intel Core 2 Duo Processor on General Purpose Computer w/ Windows XP Professional 2002 SP3 | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Library is the software module that provides advanced cryptographic functionality to all BlackBerry desktop related products." |
1620 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Mike Yoder
-Ashvin Kamaraju
|
Version 4.4.1(Firmware) |
Intel® Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Vormetric Data Security Server is a multi-chip standalone cryptographic module. The Vormetric Data Security Server is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents." 05/08/12: Updated implementation information; |
1619 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version R00.00.01_SHA_256 (Firmware) Part # AT58Z04 |
Motorola µMace AT58Z04 | 10/18/2011 |
SHA-384 
(BYTE-only) "The µMace cryptographic processor is used in security modules embedded in Motorola Solutions security products." 11/16/11: Update implementation information; |
1618 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R67.10 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) "Check Point VPN-1 Power VSX is a virtualized security gateway that allows virtualized enterprises and managed service providers to create up to 250 virtual systems (firewall, VPN, and intrusion prevention functionality within a virtual network environment) on a single, highly scalable hardware platform." |
1617 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R67.10 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Check Point VPN-1 Power VSX is a virtualized security gateway that allows virtualized enterprises and managed service providers to create up to 250 virtual systems (firewall, VPN, and intrusion prevention functionality within a virtual network environment) on a single, highly scalable hardware platform." |
1616 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R71 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Smart-1 50/150 Provider-1 Enterprise Edition brings a highly scalable multi-domain management solution to high-end enterprise customers. It includes a multi-domain management blade for management of up to 50 separate security domains, with separate management access rights while sharing global objects and policies." |
1615 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R71 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) "Smart-1 50/150 Provider-1 Enterprise Edition brings a highly scalable multi-domain management solution to high-end enterprise customers. It includes a multi-domain management blade for management of up to 50 separate security domains, with separate management access rights while sharing global objects and policies." |
1614 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R71 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Smart-1 Security management appliances, delivers a unified solution for network, IPS and endpoint Policy Management with easy log access and performance capabilities for the most demanding environments." |
1613 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Abrose
-Malcolm Levy
|
Version R71 with R7x hotfix (Firmware) |
Intel Xeon | 10/18/2011 |
SHA-1     
(BYTE-only) "Smart-1 Security management appliances, delivers a unified solution for network, IPS and endpoint Policy Management with easy log access and performance capabilities for the most demanding environments." |
1612 | McAfee, Inc. 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
|
Version 8.2 (Firmware) |
Intel Xeon; Intel Pentium; Intel Core i3; Intel Atom | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Kernel Crypto Library for SecureOS® is a firmware library that provides cryptographic services for applications across several versions of the McAfee Firewall Enterprise Appliances." |
1611 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
-Luis Chirinos
|
Version 1.0 (Firmware) |
Intel Celeron E3400 2.60GHz Dual Core; Intel Xeon E5540 2.53GHz Quad Core | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products." |
1610 | NEC Corporation 1753 Shimonumabe Nakahara-ku Kawasaki-si, Kanagawa 211-8666 Japan -NEC Corporation
|
Version 01.00 (Firmware) |
MPC8314CVRAFDA; | 10/13/2011 |
SHA-256 
(BYTE-only) "Key generation for iPASOLINK MODEM Card" |
1609 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version S1.0 (Firmware) |
STMicroelectronics ST23 | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Athena OS755 is a GlobalPlatform Java Card smart card operating system implementing AES, TDES, DRBG, SHA-1/SHA-2, RSA, SP 800-56A KAS (ECC CDH Primitive only) and ECDSA2." |
1608 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # P1020NSE |
N/A | 10/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
1607 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # P1011NSE |
N/A | 10/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." 03/02/12: Update implementation information; |
1606 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # P2020NSE |
N/A | 10/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
1605 | RSA RSA, The Security Division of EMC Suntec Tower 4 #31-01 Singapore, 038986 Singapore -Sandra Tong
-Young Son
|
Version 3.0.0.1 |
ARM9 w/ VxWorks built with Wind River Workbench 3.0 | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Crypto-C ME is evaluated as a multi-chip, standalone module. The physical cryptographic boundary of the module is the case of the general-purpose computer or mobile device, which encloses the hardware running the module." |
1604 | Hewlett-Packard 2344 Alfred-Nobel St-Laurent, Quebec H4S 0A4 Canada -Gilbert Moineau
|
Version 5.6.0 |
Intel® Core(TM)2 Duo w/ HP E-MSM765zl Kernel Firmware | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The MSM765zl Mobility Controllers centralize and simplify management and configuration of HP E-MSM4xx Access Points." |
1603 | Hewlett-Packard 2344 Alfred-Nobel St-Laurent, Quebec H4S 0A4 Canada -Gilbert Moineau
|
Version 5.6.0 |
Intel® Core(TM)2 Duo w/ HP E-MSM765zl Kernel Firmware | 10/13/2011 |
SHA-1     
(BYTE-only) "The MSM765zl Mobility Controllers centralize and simplify management and configuration of HP E-MSM4xx Access Points." |
1602 | Hewlett-Packard 2344 Alfred-Nobel St-Laurent, Quebec H4S 0A4 Canada -Gilbert Moineau
|
Version 5.6.0 |
Freescale P1020 CPU w/ HP E-MSM4xx AP Kernel Firmware | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The MSM430, MSM460 and MSM466 Access points allow wireless devices to connect to a wired network using Wi-Fi 802.11abgn." |
1601 | Inside Secure 41 Parc Club du Golf 13856, Aix-en-Provence France -David Cunningham
|
Version 1.2.1 (Firmware) Part # AT90SO128 |
Inside Secure AT90SO128 | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "VaultIC^TM are security modules designed to secure applications such as anti-cloning, physical access control, personal access control for multimedia and web applications, hardware authentication, user strong authentication, SSL support, PKCS#11 to Microsoft (R) CSP applications, PKI, DRM, trusted computing and IP protection." 05/10/12: Updated implementation information; |
1600 | Hewlett-Packard Company 8000 Foothills Boulevard Roseville, CA 95747 USA -Sunil Amanna
|
Version 5.3.1 |
Freescale 8540 w/ Integrity 5.0 | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Standard operating software for K-platform swtich products." |
1599 | Xerox Corporation MS 011-03A 800 Phillips Road Webster, New York 14580 US -Larry Kovnat
|
Version Version 1.1 |
Freescale PowerQuic III w/ Intel/WindRiver Linux V3 | 10/13/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Xerox cryptographic system based on OpenSSL is used to secure network traffic into and out of the device." 10/20/11: Update vendor information; |
1598 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
|
Version smos3.1.1.0 (Firmware) |
Texas Instruments TMS320C6416T | 10/13/2011 |
SHA-512 
(BYTE-only) "Safeguard® CryptoServer Se is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
1597 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
|
Version bl3.0.2.1 (Firmware) |
Texas Instruments TMS320C6416T | 10/13/2011 |
SHA-512 
(BYTE-only) "Safeguard® CryptoServer Se is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
1596 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Mike Yoder
-Ashvin Kamaraju
|
Version 1.0 |
Intel® Itanium® w/ HPUX 11i v3 64-bit; Intel® Xeon w/ Red Hat Enterprise Linux 5.7 64-bit; Sun UltraSPARC® II w/ Sun Solaris 10 64-bit; Intel® Xeon w/ Microsoft Windows Server 2003 32-bit; Intel® Xeon w/ Microsoft Windows Server 2008 64-bit | 10/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Vormetric Encryption Expert Kernel-Space Cryptographic Library is one of two libraries that comprise the Vormetric Encryption Expert Cryptographic Module version 4.4.1. That module is a subset of the Vormetric Encryption Export Agent, which in turn is part of the Vormetric Data Security solution." 10/19/11: Update implmentation information; |
1595 | Vormetric, Inc. 2545 North 1st Street San Jose, CA 95131 USA -Mike Yoder
-Ashvin Kamaraju
|
Version 1.0 |
Intel® Itanium® w/ HPUX 11i v3 64-bit; Intel® Xeon w/ Red Hat Enterprise Linux 5.7; Sun UltraSPARC® II w/ Sun Solaris 10 64-bit; Intel® Xeon w/ Microsoft Windows Server 2003 32-bit; Intel® Xeon w/ Microsoft Windows Server 2008 64-bit | 10/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Vormetric Encryption Expert User-Space Cryptographic Library is one of two libraries that comprise the Vormetric Encryption Expert Cryptographic Module version 4.4.1. That module is a subset of the Vormetric Encryption Export Agent, which in turn is part of the Vormetric Data Security solution." 10/19/11: Update implementation information; |
1594 | iDirect Technologies, Inc. 13865 Sunrise Valley Drive Suite 100 Herndon, VA 20171 USA -Paul Harr
-Karl Fuchs
|
Version 2.3 (Firmware) |
Intel IXP465 | 10/6/2011 |
SHA-1     
(BYTE-only) "iDirect''s AES-based bidirectional link encryption and TRANSEC DVB-S2 feature, combined with other system features such as cutting-edge coding techniques, acceleration and compression provides a fully integrated IP networking solution where security, performance and bandwidth efficiency are critical." |
1593 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA -Sonu Shankar
|
Version 15.0(1)SY2(Firmware) |
Freescale MPC8572E | 10/6/2011 |
SHA-1     
(BYTE-only) "IOS Firmware cryptographic implementations used within Cisco devices to provide cryptographic functions." 04/10/12: Updated implementation information; |
1592 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 1.00 (Firmware) |
Freescale 7448 PowerPC; IBM 750CL | 10/6/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto Module (user/kernel) provides cryptographic services to the firmware in Lexmark products." |
1591 | Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 USA -Jun Wang
|
Version 2.0 |
Dell Latitude E6400 w/ Cent OS 5 | 10/6/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A java based library to provide cryptographic functionality for java applications." |
1590 | Voltage Security, Inc. 20400 Stevens Creek Blvd. Cupertino, CA 95014 USA -Luther Martin
-Branislav Meandzija
|
Version 4.0 |
IBM z10; 2097 / E26; X2 co-processor crypto-card w/ z/OS PUT1106 / RSU1108 | 10/6/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Voltage IBE Cryptographic Module for z/OS implements the following algorithms: DSA; TDES; AES (ECB, CBC, CFB, OFB, FPE); DRNG; DRBG; SHA (1, 224, 256, 384, 512); HMAC; CMAC; RSA; DH; BF IBE; BB1 IBE; MD; DES" |
1589 | Atos Worldline SA/NV Haachtsesteenweg 1142 Brussels, 1130 Belgium -Filip Demaertalaere
-Sam Yala
|
Version 1.2 (Firmware) |
Freescale | 9/30/2011 |
SHA-256 
(BYTE-only) "The ACC is the cryptographic engine of Atos Worldline Hardware Security Module. The ACC makes use of dedicated hardware accelerators." 10/03/12: Updated implementation information; |
1588 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Angelos Kottas
-John Roberts
|
Version 1.0 |
Intel Xeon w/ CentOS 5.5 | 9/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Symantec Scanner Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec Scanner Cryptographic Module. This module supports Symantec applications by providing validated and approved cryptographic services. The incorporation of these algorithms make these products ideal for enterprise and government applications." 02/17/12: Updated implementation information; |
1587 | RSA RSA, The Security Division of EMC Suntec Tower 4 #31-01 Singapore, 038986 Singapore -Sandra Tong
-Young Son
|
Version 3.0.0.1 |
ARM9 w/ pSOS built with ARM SDT 2.51 | 9/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Crypto-C ME is evaluated as a multi-chip, standalone module. The physical cryptographic boundary of the module is the case of the general-purpose computer or mobile device, which encloses the hardware running the module." |
1586 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 4.8 (Firmware) |
Intel® Pentium Dual-Core | 9/30/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host" |
1585 | N/A | N/A | N/A | 9/30/2011 | N/A |
1584 | N/A N/A N/A, N/A N/A -N/A
-N/A
|
Version N/A Part # N/A |
N/A | 9/30/2011 |
"N/A" |
1583 | Stanley Security Solutions, Inc. 6161 E 75th St. P.O. Box 50444 Indianapolis, IN 46250 USA -Robert Strong
|
Version 1.0.0 (Firmware) |
Motorola Coldfire MCF5272; Texas Instruments TI MSP430 processor | 9/30/2011 |
SHA-256 
(BYTE-only) "The Stanley Wi-Q Advanced Encryption Algorithm is used to secure data within the Stanley Wi-Q Access Control System" |
1582 | Research in Motion 295 Philip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.7.1 (Firmware) |
Qualcomm MSM8655 Processor | 9/30/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Library is the firmware module that provides the core cryptographic functionality to BlackBerry Smartphones." |
1581 | Research in Motion 295 Philip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.7.0 (Firmware) |
Qualcomm MSM8655 Processor | 9/30/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Smartphones." |
1580 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Pei Suen
-Lei Poo
|
Version 1.0 (Firmware) |
Synopsys VCS C-2009.06-7 simulator | 9/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Marvell''s Einstein2 SoC is a highly integrated System-On-Chip (SoC) controller solution customized for NAND Flash drives. It features a NAND Flash interface controller with a highly efficient architecture, and advanced correction capabilities. Einstein2 SoC supports many FIPS Approved Cryptographic Algorithms, including AES, SHA, HMAC, RSA and RNG." |
1579 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Adam Bell
-Brandon Maas
|
Part # 1.0 |
N/A | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The SafeNet SCC650 is a highly trust design fabricated at a Trust Foundery and implements a security architecture found in other SafeNet certified ASICs. The operating system incorporates SafeNet''s well-established HA Suite B Cryptographic eXtension (CGX) library to perform all cryptographic operations." 09/22/11: Update implementation information; |
1578 | Ciena Corporation 1201 Winterson Road Linthicum, MD 21090 USA -Patrick Scully
|
Version 1.0 (Firmware) |
MPC8314e | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The 565/5100/5200 Advanced Services Platform offers an integrated transport encryption solution providing an ultra-low latency and protocol-agnostic wirespeed encryption service for use in small to large enterprises or datacenters and also offered through service providers as a differentiated managed service." |
1577 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Robert Burns
-Alan Brown
|
Version 0.9.8r |
Intel Xeon Dual Core w/ Linux - CentOS 5.2 | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "An implementation of the OpenSSL 0.9.8r library used in the Thales e-Security keyAuthority®." 10/06/11: Update implementation information; |
1576 | Ciena Corporation 1201 Winterson Road Linthicum, MD 21090 USA -Patrick Scully
|
Version 1.0 (Firmware) |
MPC8270 | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The 565/5100/5200 Advanced Services Platform offers an integrated transport encryption solution providing an ultra-low latency and protocol-agnostic wirespeed encryption service for use in small to large enterprises or datacenters and also offered through service providers as a differentiated managed service." |
1575 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -M.K Whitlock
|
Version 15.1(3)T2 (Firmware) |
Freescale MPC8358E | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 800 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments." |
1574 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -M.K Whitlock
|
Version 12.4(25d)JA1 (Firmware) |
Freescale MPC8343A | 9/20/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The embedded WLAN Access Point module (ap801) inside C881W and C881GW provides wireless funcationality for the routers." |
1573 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Robert Burns
-Alan Brown
|
Version 3.12.6 |
Intel Xeon Dual Core w/ Linux - CentOS 5.2 | 9/20/2011 |
SHA-256 
(BYTE-only) "An implementation of the SP800-90 random bit generator for providing cryptographically secure random numbers to all libraries in the Thales e-Security keyAuthority®." 10/06/11: Update implementation information; |
1572 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Robert Burns
-Alan Brown
|
Version 3.12.6 |
Intel Xeon Dual Core w/ Linux - CentOS 5.2 | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "An implementation of the NSS (Network Security Services) library used in the Thales e-Security keyAuthority®." 10/06/11: Update implementation information; |
1571 | Certicom Corp. 4701 Tahoe Blvd. Building A Missisauga, ON L4W 0B5 Canada -Certicom Sales
-Kris Orr
|
Version 6.0 |
64-bit Intel Core i5-2300 w/ RedHat Linux 5.6; 32-bit Intel Core i7 w/ RedHat Linux 5.6; 32-bit Intel Pentium III w/ QNX 6.5; ARM Cortex A9 MPCore w/ QNX 6.6; Intel Core 2 Duo w/ Mac OS X 10.5; 32-bit Intel Core i5-2300 w/ Windows 7 | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules." 10/01/11: Update implementation information; |
1570 | Hughes Network Systems, LLC. 11717 Exploration Lane Germantown, MD 20876 USA -Tim Young
|
Version 1.0 (Firmware) |
AMCC PowerPC (32-bit); Intel Pentium 4 (32-bit); Intel dual-core Xeon (32-bit); | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The HSCK v1.0 is a firmware library that provides cryptographic functionality for securing communications over the Hughes SPACEWAY Satellite communication systems. SPACEWAY enables a full-mesh digital network that interconnects with a wide range of end-user equipment and systems." |
1569 | Hitachi Solutions, Ltd. 4-12-7,Higashishinagawa Shinagawa-ku, Tokyo 140-0002 Japan -Applied Security Development Department
|
Version 1.0 Rev. 2 |
Intel(R) Core(TM) i5-650 w/ Windows XP Professional; Intel(R) Core(TM) i5-650 w/ Windows Vista Ultimate; Intel(R) Core(TM) i5-650 w/ Windows 7 Ultimate; Intel(R) Core(TM) i5-650 w/ Windows 7 Ultimate 64bit | 9/20/2011 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HIBUN Cryptographic Module for Kernel-Mode is the cryptographic library module which operates on the Windows Kernel-Mode." |
1568 | Senetas Corporation Ltd. Level 1, 11 Queens Road Melbourne, Victoria 3004 Australia -John Weston
-Horst Marcinsky
|
Version 0.9.8 (Firmware) |
Motorola Freescale MPC8280 (PPC32) | 9/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Senetas Corporations''s CN Series Crypto library provides FIPS 140-2 approved cryptographic algorithms for the CN Series family of products. Based on OpenSSL, the CN Series Crypto library provides an Application Programming Interface (API) to support security relevant services within the CN1000 and CN3000 Series products." |
1567 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada -Chris Brych
-Laurie Smith
|
Version 4.8.7 (Firmware) |
StrongARM-11 80200 600 MHz | 9/6/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Luna PCM/PCM KE/CA4 offer dedicated hardware key management to protect sensitive cryptographic keys from attack. Digital sign/verify operations are performed in the HSM to increase performance and maintain security. Cryptographic keys are backed up by a FIPS-approved algorithm and can be stored in software or replicated on one or more tokens." |
1566 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2R1 (Firmware) |
Cavium Octeon | 9/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router IPSec designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." |
1565 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2R1 (Firmware) |
Cavium Octeon | 9/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
1564 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2R1 (Firmware) |
Cavium Octeon | 9/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." |
1563 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 11.2R1 (Firmware) |
Cavium Octeon | 9/6/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router IPSec designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." |
1562 | Hitachi Solutions, Ltd. 4-12-7,Higashishinagawa Shinagawa-ku, Tokyo 140-0002 Japan -Applied Security Development Department
|
Version 1.0 Rev. 2 |
Intel(R) Core(TM) i5-650 w/ Windows XP Professional; Intel(R) Core(TM) i5-650 w/ Windows Vista Ultimate; Intel(R) Core(TM) i5-650 w/ Windows 7 Ultimate; Intel(R) Core(TM) i5-650 w/ Windows 7 Ultimate 64bit; Intel(R) Core(TM) i5-650 w/ Linux Kernel 2.6 (Fedora 12) | 8/30/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HIBUN Cryptographic Module for User-Mode is the cryptographic library module which operates on the Windows User-Mode and Linux User-Mode." |
1561 | Hitachi Solutions, Ltd. 4-12-7,Higashishinagawa Shinagawa-ku, Tokyo 140-0002 Japan -Applied Security Development Department
|
Version 1.0 Rev. 2 |
Intel(R) Core(TM) i5-650 w/ Pre-boot 16-bit | 8/30/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) "HIBUN Cryptographic Module for Pre-boot is the cryptographic library module which operates on the Pre-boot OS." 09/08/11: Update implementation information; |
1560 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Iain Holness
|
Version MAL000001E |
Intel Core 2 Duo w/ Fedora Core 3 | 8/30/2011 |
SHA-256 
(BYTE-only) "The MAL Cryptographic Library implements the RSA and SHA-256 cryptographic algorithms." |
1559 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Vincent Moscaritolo
|
Version 4.2.0 |
Apple MacBook Pro 13" w/ Mac OS X 10.7; Apple iPad w/ iOS 5 | 8/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP Cryptographic Engine includes a wide range of field-tested, standards-based encryption, and encoding algorithms used by PGP Whole Disk Encryption." |
1558 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Vincent Moscaritolo
|
Version 4.2.0 |
Apple iPad w/ iOS 5; Dell PowerEdge 860 Dual Core Xeon 3060 processor, 1GB RAM, DVD_ROM, 80 GB SATA hard disk drive w/ Windows XP Professional SP3; Dell Power Edge 860 Dual Core Xeon 3060 processor, 1 GB RAM, DVD-ROM, 80 GB SATA hard drive w/ Linux, 32-bit CentOS 5.5; Apple MacBook Pro 13" w/ Mac OS X 10.7 | 8/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK Cryptographic Module is a FIPS 140-2 validated software only cryptographic module. The module implements the cryptographic functions for PGP products including: PGP Whole Disk Encryption, PGP NetShare, PGP Command Line, PGP Universal, and PGP Desktop. It includes a wide range of field-tested and standards-based encryption, digital signa" 09/13/11: Update implementation information; |
1557 | Motorola Solutions Inc. Unit A1, Linhay Business Park Ashburton, Devon TQ13 7UP UK -Richard Carter
|
Version PTP800-SHA-04-00 (Firmware) |
TI TMS320C6421 | 8/30/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "PTP800 Crypto Libraries: used in the PTP800 product. Operating in the 6 to 38 GHz RF bands at up to 368 Mbps throughput (full duplex) and with user-configured channel bandwidths from 7 to 56 MHz, the Motorola Point-to-Point 800 Series of Licensed Ethernet Microwave solutions offer operators a highly reliable licensed band wireless solution." 09/08/11: Update implementation information; |
1556 | N/A | N/A | N/A | 8/30/2011 | N/A |
1555 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 3.0.0.14 |
Freescale MPC8536DS w/ TimeSys Linux 2.6.26.8 | 8/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
1554 | Thales E-Security Ltd Jupiter House Station Road Cambridge, CB5 8JJ UK -Marcus Streets
-Mark Wooding
|
Version 2.50.17 (Firmware) |
Freescale DragonBall MXL | 8/30/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The MiniHSM Algorithm Library provides cryptographic functionality for the MiniHSM series of Thales hardware security modules." |
1553 | NXP Semiconductors Mikronweg 1 Gratkorn, 8101 Austria -Markus Moesenbacher
|
Version SHA_CL_V2.7 (Firmware) |
NXP P5CD081 Family | 8/18/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Single Chip Module with NXP Secure Smart Card Controller of P5CD081 Family and NXP Java Card and GlobalPlatform OS JCOP 2.4.2 R0. P5CD081 Family comprises: P5CD145 V0A, P5CC145 V0A, P5CN145 V0A, P5CD128 V0A, P5CC128 V0A, P5CD081 V1A, P5CC081 V1A, P5CN081 V1A, P5CD051 V1A, P5CD041 V1A, P5CD021 V1A and P5CD016 V1A." |
1552 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Lei Poo
-Yoko Enokida
|
Version 1.0 (Firmware) |
88SS9187 | 8/18/2011 |
SHA-256 
(BYTE-only) "Marvell''s Monet 2.0 SoC is a highly integrated System-On-Chip (SoC) controller solution customized for NAND Flash drives. It feaures a NAND Flash interface controller with a highly efficient architecture, and advanced correction capabilities." |
1551 | ChaseSun Information Security Technology Development (Bejing)., Ltd. Building B, Shumazhuangyuan No. 1 Disheng West Street, BDA Beijing, 100176 P.R. China -Pugui Chen
|
Version 1.0 (Firmware) |
Mentor ModelSim SE 6.5b (Simulator) | 8/18/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "DCI Audio/Video Decoder Card FPGA Library implements the cryptographic algorithms such as AES, HMAC, and SHA. The Library provides cryptographic functionality to DCI Audio/Video Decoder Card." |
1550 | ChaseSun Information Security Technology Development (Bejing)., Ltd. Building B, Shumazhuangyuan No. 1 Disheng West Street, BDA Beijing, 100176 P.R. China -Peng Sun
|
Version 1.0 (Firmware) |
Marvell 88AP303 | 8/18/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "DCI Audio/Video Decoder Card Crypto Library implements the cryptographic algorithms such as AES, HMAC, RSA, SHA and RNG. The Library provides cryptographic functionality to DCI Audio/Video Decoder Card." 03/27/13: Updated vendor information; |
1549 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 5.0.1 |
Intel Core i7-2620M w/ Microsoft Windows XP SP3 (32-bit) with Sun JRE5.0; Intel Core i7-2620M w/ Microsoft Windows XP SP3 (32-bit) with Sun JRE6.0 | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" |
1548 | Diversinet Corp. 2235 Sheppard Avenue East Atria II Suite 1700 Toronto, Ontario M2J5B5 Canada -Salah Machani
-Hussam Mahgoub
|
Version 1.0 |
TI OMAP2420 w/ Java ME MIDP 2.0; Marvell PXA930 w/ BlackBerry OS v6; Qualcomm Snapdragon w/ Android 2.2; | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Diversinet Java ME Crypto Module is shipped with Diversinet MobiSecure Client SDK for Java based run-time environments on Smartphones and tablets including, Android OS-, BlackBerry OS- and Java ME MIDP-based. The Crypto Module implements several cryptography algorithms including Triple DES, AES, SHA, HMAC and RSA." 08/30/11: Add new tested information; |
1547 | Diversinet Corp. 2235 Sheppard Avenue East Atria II Suite 1700 Toronto, Ontario M2J5B5 Canada -Salah Machani
-Hussam Mahgoub
|
Version 1.0 |
Intel Xeon E5530 w/ Microsoft Windows Server 2008 and JDK 1.6 | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Diversinet Java SE Crypto Module is a JCA (Java Cryptography Architecture) Provider shipped with Diversinet MobiSecure Products. The Crypto Module implements several JCE (Java Cryptography Extension) algorithms including Triple DES, AES, SHA, HMAC and RSA. The Crypto Module is packaged in a signed Java Archive (JAR) file." 02/09/12: Updated implementation information; |
1546 | Green Hills Software 19415 Deerfield Avenue Suite 204 Lansdowne, VA 20176 USA -David Sequino
-Douglas Kovach
|
Version v1.0.4 |
Motorola PowerPC w/ INTEGRITY v5.0.11; Intel Celeron w/ Linux RHEL5 | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Green Hills Software Integrity Security Services (ISS) High Assurance Embedded Crypto Tookit (HA-ECT)" |
1545 | SenSage 1400 Bridge Parkway Suite 202 Redwood City, CA 94065 USA -Brad Kekst
-Rao Yendluri
|
Version v1.0 |
Intel Xeon w/ Red Hat Enterprise Linux 5.1; Intel Xeon w/ Red Hat Enterprise Linux 5.5; AMD Opteron w/ Red Hat Enterprise Linux 5.1; AMD Opteron w/ Red Hat Enterprise Linux 5.5; | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SenSage offers Event Data Warehouse solutions that handle massive amounts of log and event data. Event data contains evidence directly pertaining to and resulting from the execution of a business process or system function." |
1544 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Ashit Vora
|
Version 0.9.8r.1.1 |
Intel Core i5 w/ FreeBSD 8.2 (64-bit); Intel Core i5 w/ FreeBSD 8.2 (32-bit); Intel Xeon w/ Red Hat Enterprise Linux v5 (32-bit); Intel Xeon w/ Red Hat Enterprise Linux v5 (64-bit); Cavium Octeon w/ Linux Kernel 2.6.27.7; IBM PowerPC G4 w/ Yellow Dog Linux 6.2; Intel Pentium 4 w/ Windows 7 SP1 (32-bit); Intel Core i5 w/ Windows 7 SP1 (64-bit); Intel Core 2 Duo w/ Mac OS X 10.6 (32-bit); Intel Core 2 Duo w/ Mac OS X 10.6 (64-bit); Intel Pentium 4 w/ Openwall Linux 3.0 (32-bit); Qualcomm Snapdragon w/ Android 2.3.3; | 8/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cisco Common Cryptographic Module (C3M) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products." |
1543 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.4fm |
ARMv7 w/ Android 2.3; ARMv7 w/ Android 4.0 | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com" 05/14/12: Added new tested information; |
1542 | Giesecke & Devrient 45925 Horseshoe Drive Dulles, VA 20166 USA -Thomas Palsherm
-Jatin Deshpande
|
Version Sm@rtCafé Expert 6.0 (Firmware) |
NXP Secure_MX51 | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The firmware is a Classic Edition Java Card 3 Platform that implements the GlobalPlatform (GP) Card Specification Version 2.1.1 and the Secure Channel Protocol 03." |
1541 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Allan MacPhee
|
Version 7.5 |
Intel Pentium 4 w/ Microsoft Windows 2008 R2 (64-bit) | 8/3/2011 |
SHA-256 
(BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for the Deep Security Manager centralized management component used to configure security policy and deploy protection to enforcement components." |
1540 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Allan MacPhee
|
Version 7.5.0 |
Intel Core 2 Duo w/ VMWare ESX 4.1 | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for Deep Security Agents and Appliances deployed directly on protected computers." |
1539 | Voltage Security, Inc. 20400 Stevens Creek Blvd. Cupertino, CA 95014 USA -Luther Martin
-Branislav Meandzija
|
Version 4.0 |
Intel Xenon 2.80 GHz w/ Red Hat Enterprise Linux Server 5.3, 32-bit; Intel x64 1000 MHz w/ Windows 7 Professional SP1, 32-bit | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Voltage IBE Cryptographic Module implements the following algorithms: DSA; TDES; AES (ECB, CBC, CFB, OFB, FPE); DRNG; DRBG; SHS; HMAC; CMAC; RSA; DH; BF IBE; BB1 IBE; MD; DES" 09/13/11: Update implementation information; |
1538 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 1.9.0 (Firmware) |
Broadcom BCM1193 | 8/3/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The software library implements SRTP protocol for securing RTP and RTCP protocols." |
1537 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Chris Brych
-Laurie Smith
|
Version 6.2.1 (Firmware) |
AMCC PowerPC 440EPx | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor." |
1536 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Ashit Vora
|
Version 1.0 (Firmware) |
Cisco Yeti-II Power-PC 405 | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "IOS cryptographic implementation for Catalyst 3000 line of products" |
1535 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 12.0.105.1 (Firmware) |
Texas Instruments TNETV105x MIPS | 8/3/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The software library implements SRTP protocol for securing RTP and RTCP protocols." |
1534 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 1.1.0 (Firmware) |
Texas Instruments TNETV1050 MIPS | 8/3/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The software library implements SRTP protocol for securing RTP and RTCP protocols" |
1533 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 0.9.8k (Firmware) |
Texas Instruments TNETV105x MIPS; Broadcom BCM1193 | 8/3/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "OpenSSL library provides generic cryptographic functions for the phones including TLS and SSL protocol implementations." |
1532 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 1.4.2 (Firmware) |
Texas Instruments TNET1050 MIPS; Texas Instruments PSYLOCKE ASIC MIPS; Broadcom BCM1101 MIPS | 8/3/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The software library implements SRTP protocol for securing RTP and RTCP protocols" |
1531 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Jim Dickens
-Chris Brych
|
Part # SF914-35005-002A |
N/A | 8/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution." |
1530 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Joel Tang
|
Version 3.03 (Firmware) Part # DT4000 v1.0 |
DT4000 v1.0 | 8/3/2011 |
SHA-256 
(BYTE-only) "Kingston''s DataTraveler DT4000 Series USB Flash Drive is assembled in the US for organizations that require a secure way to store and transfer portable data. The stored data is secured by hardware-based AES-256 encryption to guard sensitive information in case the drive is lost or stolen." |
1529 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version LK2.6.36.3_AHC_KM1.0 |
ARMv7 Processor w/ Linux Kernel 2.6.36.3 and Android Honeycomb version 3.1; | 8/3/2011 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices. " 11/17/11: Update implementation information; |
1528 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version LK2.6.35.7_AGB_KM1.0 |
ARMv7 Processor w/ Linux Kernel 2.6.35.7 and Android Gingerbread version 2.3.4 | 8/3/2011 |
SHA-256 
(BYTE-only) "General purpose Key derivation and authentication services library for Linux used by Samsung devices. " 11/17/11: Update implementation information; |
1527 | Beijing Huada Infosec Technology Co.,Ltd 4F,Tower B,Yandong Building,No.2 Wanhong West Street,Chaoyang District Beijing, Beijing 100015 P.R.China |
Version V1.0 (Firmware) |
IS8U192A with 8-bit HC8051 embedded | 8/3/2011 |
SHA-256 
(BYTE-only) "XA_RNGC V1.0 Hardware Cryptographic Library provides core cryptographic functionality for Beijing Huada Infosec''s security IC providing a capability to develop complex and flexible security applications." |
1526 | Data-Pac Mailing Systems Corp. 1217 Bay Road Webster, NY 14580 USA -Ken Yankloski
-John Keirsbilck
|
Part # MAXQ1959B-F50# |
N/A | 8/3/2011 |
SHA-1     
(BYTE-only) The algorithm implementation of SHA-1 does not support length messages larger than Len=8432. "The Data-Pac MAXQ1959B-F50# Postal Security Device (PSD) is an embedded cryptographic module used for postage evidencing. The PSD complies with FIPS 140-2 standards and postal requirements to support the USPS IBI program, including strong cryptographic and physical security for the protection of postal funds." |
1525 | A10 Networks, Inc. 2309 Bering Drive San Jose, CA 95131 USA -John Chiong
|
Part # CN1620 |
N/A | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 11/08/13: Added new tested information; |
1524 | A10 Networks, Inc. 2309 Bering Drive San Jose, CA 95131 USA -John Chiong
|
Part # CN1615 |
N/A | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 10/25/13: Added new tested information; |
1523 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 5.2.8 (Firmware) |
Strong Arm II (80219) | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna® PCI for IS/RSS Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1522 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 5.2.7 (Firmware) |
Strong Arm II (80219) | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna® PCI for IS/RSS Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1521 | Advantor Systems, LLC 12612 Challenger Pkwy, Suite 300 Orlando, FL 32826 USA -Chuck Perkinson
|
Part # 1.4.4 |
N/A | 7/14/2011 |
SHA-1     
(BYTE-only) "The Infraguard Processor Module (IPM) is a mult-chip, embedded, plug-in encryption module coated with an opaque, tamper evident material. " |
1520 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Sunil Chitnis
-Bob Colvin
|
Version 12.3.02 (Firmware) |
Freescale MPC8572E | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Our Goal is to receive FIPS 140-2 SL2 certification (hardware category- tamper detection tape) on the above platforms. For this, we have identified the cryptographic boundary to be the management module (with access to E2PROM on backplane). The software is to be updated to use NSS/NSPR as the cryptographic engine." |
1519 | A10 Networks, Inc. 2309 Bering Drive San Jose, CA 95131 USA -John Chiong
|
Version 1.0.0 (Firmware) |
Intel Xeon E5520; Intel Xeon E5540; Intel Xeon X5550; Intel Xeon X5570; Intel Xeon X5690; Intel Xeon X5670; Intel Xeon X5650; Intel Xeon E5620; Intel Xeon E3127; Intel Xeon E3-1230; Intel Xeon E5-2680; Intel Xeon E5-2687; Intel Xeon E5-2690 ;  Intel Xeon E5-1650; Intel Xeon E5-2697 | 7/14/2011 |
SHA-1     
(BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 04/06/12: Added new tested information; |
1518 | Vocality International Ltd Lydling Barn, Puttenham Lane Shackleford, Surrey GU8 6AP UK -Martin Saunders
|
Version 5.3.1v (Firmware) |
BASICS IP with Freescale PowerQuicc III CPU | 7/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BASICS IP product is a small, high performance, low power IP router in a PC104plus form-factor intended for intergration into communications systems. It supports a number of encryption algorithms which can be utilised by the IPSEC, IKE and SSH protocols it supports." |
1517 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version LK2.6.35.7_AGB_V1.2 |
ARMv7 Processor w/ Linux Kernel 2.6.35.7 and Android Gingerbread version 2.3.4 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 10/27/11: Update implementation information; |
1516 | Samsung Electronics Co., Ltd 416, Maetan 3-Dong Youngtong Gu Suwon, Gyeonggi 152-848 South Korea -Ross Choi
-Bumhan Kim
|
Version LK2.6.36.3_AHC_V1.2 |
ARMv7 Processor w/ Linux Kernel 2.6.36.3 and Android Honeycomb version 3.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services." 10/27/11: Update implementation information; |
1515 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-5.el6_1.2 |
AMD Opteron w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 32bit word size." |
1514 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-10.el6_1.4 |
AMD Opteron w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
1513 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-5.el6_1.2 |
Intel x86 w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 64bit word size." |
1512 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -Malcolm Levy
|
Version R70.1 |
Intel® Pentium® 4 Xeon w/ Check Point SecurePlatform | 7/11/2011 |
SHA-1     
(BYTE-only) "Check Point''s VPN-1 version R70.1 is a tightly integrated software solution combining the FireWall-1 (FW-1) security suite with sophisticated Virtual Private Network (VPN) technologies and a hardened SecurePlatform operating system (OS)." |
1511 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -Malcolm Levy
|
Version R70.1 |
Intel® Pentium® 4 Xeon w/ Check Point SecurePlatform | 7/11/2011 |
SHA-1     
(BYTE-only) "Check Point''s VPN-1 version R70.1 is a tightly integrated software solution combining the FireWall-1 (FW-1) security suite with sophisticated Virtual Private Network (VPN) technologies and a hardened SecurePlatform operating system (OS)." |
1510 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seth Ross
|
Version Junos-FIPS 10.4R5 |
Processor: Pentium III 850MHz w/ Junos-FIPS 10.4R5; Pentium-M 2GHz w/ Junos-FIPS 10.4R5 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Junos-FIPS for use in M Series, MX Series, and T Series router family." 05/22/12: Updated implementation information; |
1509 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seth Ross
|
Version Junos-FIPS 10.4R5 |
Processor: Pentium III 850MHz w/ Junos-FIPS 10.4R5; Pentium-M 2GHz w/ Junos-FIPS 10.4R5 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Junos-FIPS for use in M Series, MX Series, and T Series router family." 05/22/12: Updated implementation information; |
1508 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seth Ross
|
Version Junos-FIPS 10.4R5 Junos-FIPS 10.4R5 |
Processor: Pentium III 850MHz w/ Junos-FIPS 10.4R5; Pentium-M 2GHz w/ Junos-FIPS 10.4R5 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Junos-FIPS for use in M Series, MX Series, and T Series router family." 05/22/12: Updated implementation information; |
1507 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-5.el6_1.2 |
AMD Opteron w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 64bit word size." |
1506 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.5-5.el6_1.1 |
Intel x86 w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 32bit word size." |
1505 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-10.el6_1.4 |
AMD Opteron w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
1504 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-10.el6_1.4 |
Intel x86 w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." |
1503 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.0.0-10.el6_1.4 |
Intel x86 w/ Red Hat Enterprise Linux 6.1 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." |
1502 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seth Ross
|
Version Junos-FIPS 10.4R5 |
Processor: Pentium III 850MHz w/ Junos-FIPS 10.4R5; Pentium-M 2GHz w/ Junos-FIPS 10.4R5 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Junos-FIPS for use in M Series, MX Series, and T Series router family." 05/22/12: Updated implementation information; |
1501 | Hewlett-Packard Company 8000 Foothills Boulevard Roseville, CA 95747 USA -Sunil Amanna
|
Version 5.3.1 |
Freescale 8540 w/ Integrity 5.0 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Standard operating software for K-platform switch products." |
1500 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.3.1v |
Freescale PowerQuicc III w/ ThreadX v5.3 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." |
1499 | Protected Mobility 6259 Executive Blvd Rockville, MD 20852 USA -Paul Benware
|
Version 1.0 |
ARM Cortex-A9 w/ Android 3.0; ARM Cortex-A8 w/ Andriod 2.2; ARM Cortex-A9 w/ Android 2.3; ARM 6 w/ iOS 4.2; ARM 7 w/ iOS 4.2; ARM 7 w/ iOS 4.3 | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "Cryptographic library running on Android and IOS for for encryption, decryption, hashing and random number generation." |
1498 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
|
Version hash1.0.7.0 (Firmware) |
Texas Instruments TMS320C6416T | 7/11/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Safeguard® CryptoServer Se is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
1497 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
|
Part # FC 3863, EC N29802 D86E |
N/A | 6/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM zSeries CP Assist feature provides processor-integrated hardware acceleration for TDES, AES and SHA variants." |
1496 | IBM z/VM Design and Development 1701 North Street Building 250-2 Endicott, NY 13760 U.S. -Brian W. Hugenbruch
|
Version 6.1 plus APAR PM08418 Part # 5741-A08 |
System z10 Enterprise Class processor w/ IBM z/VM V6.1 | 6/29/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files." |
1495 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
|
Version smos3.1.0.6 (Firmware) |
Texas Instruments TMS320C6416T | 6/29/2011 |
SHA-512 
(BYTE-only) "Safeguard® CryptoServer Se is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
1494 | Utimaco Safeware AG Germanusstraße 4 Aachen, 52080 Germany -Dr. Gesa Ott
|
Version bl3.0.2.0 (Firmware) |
Texas Instruments TMS320C6416T | 6/29/2011 |
SHA-512 
(BYTE-only) "Safeguard® CryptoServer Se is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
1493 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551 Min-Tsu Road SEC.5 Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 2.0 (Firmware) |
Java Card Runtime Environment v2.2.2 with Global Platform v2.1.1 on Renesas AE-5 Series Processor | 6/29/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HiKey Cryptographic Library supports AES, Triple-DES, HMAC, SHS, RSA and a NIST 800-90 Hash DRBG Implementations for the HiKey PKI token and HiKey flash products." 07/13/11: Update implementation information; |
1492 | NationZ 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1, Nanshan District Shenzen, Guangdong 518057 P.R.C. |
Version V1.0 (Firmware) |
8-bit NationZ Security IC | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Z8H128D32CP chip is based on the 8-bit CPU Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc." |
1491 | NationZ 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1, Nanshan District Shenzen, Guangdong 518057 P.R.C. |
Version V1.0 (Firmware) |
32-bit NationZ Security IC | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Z32H320TP chip is based on the 32-bit CPU Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc." |
1490 | NationZ 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1, Nanshan District Shenzen, Guangdong 518057 P.R.C. |
Version V1.0 (Firmware) |
8-bit NationZ Security IC | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Z8D64 chip is based on the 8-bit CPU Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc." |
1489 | NationZ 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1, Nanshan District Shenzen, Guangdong 518057 P.R.C. |
Version V1.0 (Firmware) |
32-bit NationZ Security IC | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Z32D1024 chip is based on the 32-bit CPU Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc." |
1488 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China |
Version V1.0 (Firmware) |
32-bit NationZ Security IC | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Z32H256D40CPR chip is based on the 32-bit CPU Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc." |
1487 | Micron Technology 3060 N. First Street San Jose, CA 95134 USA -Mehdi Asnaashari
|
Version 5967 (Firmware) |
Marvell Van Gogh Controller Embedded ARM Processor | 6/22/2011 |
SHA-256 
(BYTE-only) "Solid State hard drive" |
1486 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA34156 Part # 5694-A01 |
IBM zEnterprise(TM) 196 w/ IBM z/OS® V1.12 | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens." |
1485 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA34156 Part # 5694-A01 |
IBM zEnterprise(TM) 196 w/ IBM z/OS® V1.12 | 6/22/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens." |
1484 | Quest Software, Inc. 5 Polaris Way Aliso Viejo, CA 92656 USA -Dr. Einar Mykletun
|
Version 1.2.1 |
Intel Core 2 Duo T2300 w/ openSUSE 11.2 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Quest Authentication Services addresses authentication by extending th security and compliance to Active Directory to Unix, Linux and Mac, as well as to many enterprise applications." |
1483 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 8800740013F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1482 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 8800740012F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1481 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 8800740010F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1480 | A10 Networks, Inc. 2309 Bering Drive San Jose, CA 95131 USA -John Chiong
|
Version 1.0.0 (Firmware) |
Intel Xeon E5540; Intel Xeon E5520; Intel Xeon X5550; Intel Xeon X5570; Intel Xeon X5690; Intel Xeon E31270; Intel Xeon E5620; Intel Xeon X5650; Intel Xeon X5670; Intel Xeon E5690; Intel Xeon E3-1230; Intel Xeon E5-2680; Intel Xeon E5-2687; Intel Xeon E5-2690; Intel Xeon E5-1650; Intel Xeon E5-1650; Intel Xeon E5-2697 | 6/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AX Series Advanced Traffic Manager is designed to meet the growing demands of Web sites, carriers and enterprises. The AX offers intelligent Layer 4-7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices." 07/14/11: Add new tested information; |
1479 | Mxtran Inc. 9F, No.16, Li-Hsin Road, Science Park Hsin-chu, Taiwan 300 Taiwan, R.O.C. -C.W. Pang
|
Version 1.0 (Firmware) |
NC-verilog simulator | 6/16/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Mxtran Cryptographic IP Library provides the synthesizable hardware IP cores for the cryptographic services of all Mxtran''s security related products." 08/10/12: Added new tested information; |
1478 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 3.0 FUP 1 v1.0 (Firmware) Part # 8800740013F |
SPYRUS SPYCOS 3.0 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1477 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 3.0 FUP 1 v1.0 (Firmware) Part # 8800740012F |
SPYRUS SPYCOS 3.0 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1476 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 3.0 FUP 1 v1.0 (Firmware) Part # 8800740010F |
SPYRUS SPYCOS 3.0 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1475 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 3.0 FUP 1 v1.0 (Firmware) Part # 880074009F |
SPYRUS SPYCOS 3.0 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1474 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 880074009F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1473 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 2.4 FUP 3 v1.32 (Firmware) Part # 880074007F |
SPYRUS SPYCOS 2.4 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1472 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 880074007F |
Xilinx XC3S500E | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1471 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 880074007F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1470 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version SPYCOS 2.4 FUP 2 v1.48 (Firmware) Part # 880074006F |
SPYRUS SPYCOS 2.4 | 6/16/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1469 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 880074006F |
Xilinx XC3S500E | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1468 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Jack Young
|
Version 03.00.0C (Firmware) Part # 880074006F |
NXP LPC3131 | 6/16/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 06/27/11: Update implementation information; |
1467 | Certes Networks Inc 300 Corporate Center Drive Suite 140 Pittsburgh, PA 15108 USA -Todd Cignetti
|
Version 1.6 (Firmware) |
Netlogic XLR; Netlogic XLS | 6/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Certes Networks CEP-VSEs are high performance enforcement points offering variable speed encryption and authentication from 3 Mbps-10Gbps. Policies are defined in a centralized management solution. Roles are assigned for policy control and device management. CEP-VSEs encrypt at Layers 2, 3 or 4 in a way that is transparent to the network." 06/28/11: Update implementation information; |
1466 | Certes Networks Inc 300 Corporate Center Drive Suite 140 Pittsburgh, PA 15108 USA -Todd Cignetti
|
Version 1.6 (Firmware) |
Netlogic XLR; Netlogic XLS | 6/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Certes Networks CEP-VSEs are high performance enforcement points offering variable speed encryption and authentication from 3 Mbps-10Gbps. Policies are defined in a centralized management solution. Roles are assigned for policy control and device management. CEP-VSEs encrypt at Layers 2, 3 or 4 in a way that is transparent to the network." 06/28/11: Update implementation information; |
1465 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version A1.0 (Firmware) |
Inside Secure AT90SC w/ OS755 | 6/16/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Athena OS755 is a GlobalPlatform Java Card smart card operating system implementing AES, TDES, DRBG, SHA-1/SHA-2, RSA, SP 800-56A, KAS ( ECC CDH Primitive only) and ECDSA2." |
1464 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 2.0 |
iPhone4 - Apple A4 w/ iOS 5 | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Apple iOS CommonCrypto Module v2.0 cryptographic library offering various cryptographic mechanisms to apps." |
1463 | Apple Inc. 1 Infinite Loop Cupertino, CA 95014 USA |
Version 2.0 |
iPad2 - Apple A5 w/ iOS 5 | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Apple iOS CommonCrypto Module v2.0 cryptographic library offering various cryptographic mechanisms to apps." |
1462 | ZyFLEX Technologies, Inc. 4F,No.5-2, Industry E. 9th Rd., Science park Hsinchu Hsinchu, 30075 Taiwan, R.O.C. -Nick Tseng
|
Version 1.0 (Firmware) |
NIOS2 (Altera FPGA embedded processor) | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The ZyFLEX Crypto Library implements the cryptographic algorithms such as AES, HMAC, DSA, RSA, SHA and RNG. The ZyFLEX Crypto Library is designed to provide secure communications in an IP-based network." |
1461 | Watchdata Technologies Pte Ltd Admirax 8 Admiralty Street #2-07/08 Singapore, Singapore 757438 Singapore -Jing Bai
-Haitao Cao
|
Version 1.0.0.1 (Firmware) |
CIU96S192UFB | 6/7/2011 |
SHA-256 
(BYTE-only) "Watchdata-FIPS-S192-TimeCOS Hardware Cryptographic Library provides core cryptographic functionality for Watchdata''s security products providing a capability to develop complex and flexible security applications." |
1460 | Trend Micro Inc. 40 Hines Road Suite 200 Ottawa, ON K2K 2M5 Canada -Marion Chase
-Allan MacPhee
|
Version 7.5.0 |
Intel Core 2 Duo w/ Windows 2008 | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for Deep Security Agents and Appliances deployed directly on protected computers." |
1459 | Nexgrid 4444 Germanna Hwy Locust Grove, VA 22508 USA -Thomas McLure
-Haim Shaul
|
Version 1.2.2 (Firmware) |
Atheros AR7141 | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ecoNet smart grid gateways provide the central link between intelligent endpoint devices and the Utility''s backhaul or WAN enabling real time network control and monitoring." |
1458 | N/A | N/A | N/A | 6/7/2011 | N/A |
1457 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Version 11.5.1 (Firmware) |
Intel Celeron 440; Intel E5410/L5410; IntelIXP 435; Intel Q9400; Intel E5645; Freescale P1020; Freescale P1011; Freescale P2020 | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." 10/11/11: Add new tested information; |
1456 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 2.4 (Firmware) |
Bluefly Processor | 6/7/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." 04/23/12: Updated vendor information; |
1455 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
|
Version i.MX61 (Firmware) |
Chronologic VCS simulator, vcs D-2010.06-04 | 6/7/2011 |
SHA-256 
(BYTE-only) "Freescale''s RNG4 4.0 is included in i.MX media processors, including: iMX61. It is planned for inclusion in multiple additional i.MX processors and in the QorIQ integrated Communications Processor family." |
1454 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # 400BG233-P-G |
N/A | 6/7/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." 06/01/11: Update implementation information; |
1453 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # 350BG233-G |
N/A | 6/7/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
1452 | WatchGuard Technologies, Inc. 505 Fifth Avenue South, Suite 500 Seattle, Washington 98104 USA -Peter Eng
|
Part # NHIXP435AE |
N/A | 6/7/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "WatchGuard XTM security appliances are designed to protect organizations from various security and productivity threats, including viruses, network attacks, intrusion attempts, Trojan horses, harmful or counterproductive URLs, spam, and more, while also providing secure Virtual Private Network (VPN) connections among workplaces and remote users." |
1451 | N/A | N/A | N/A | 5/25/2011 | N/A |
1450 | Harris Corporation 221 Jefferson Ridge Parkway Lynchburg, VA 24501 USA -Brian Justice
|
Version R1A (Firmware) |
Freescale MPC860P | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "MPC860 software library for AES encryption and decryption for Harris Corporation Interop Gateway Applications." 05/23/11: Update implementation information; |
1449 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Sunil Chitnis
-Bob Colvin
|
Version FastIron 7.2.1 (Firmware) |
Freescale MPC8248; Freescale MPC8544E; Freescale MPC8245 | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Our Goal is to receive FIPS 140-2 SL2 certification on the above platforms. For this, we have identified the cryptographic boundary to be the management module (with access to E2PROM on backplane). The software is to be updated to use NSS/NSPR as the cryptographic engine." |
1448 | Uplogix, Inc. 7600 B North Capital of Texas Highway Suite 220 Austin, TX 78731 USA -Martta Howard
|
Version 1.4.4 (Firmware) |
AMD Geode; Intel Celeron | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Uplogix remote management appliances utilize Libgcrypt to provide cryptograhic algorithms to connect to IPSec VPNs. See http://www.uplogix.com and http://www.gnupg.org/ for more information" |
1447 | Micron Technology 3060 N. First Street San Jose, CA 95134 USA -Mehdi Asnaashari
|
Version 2266 (Firmware) |
Marvell Van Gogh Controller Embedded ARM processor | 5/24/2011 |
SHA-256 
(BYTE-only) "Solid State hard drive" |
1446 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoffrey Waters
|
Part # P4080r2 |
N/A | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Freescale''s MDHA is included in multiple QorIQ Integrated Communications Processor, including: P4080, P4040, P3041, P5020, P2040, P2041, P1010, and P1023." |
1445 | Uplogix, Inc. 7600 B North Capital of Texas Highway Suite 220 Austin, TX 78731 USA -Martta Howard
|
Version 3.12.6 (Firmware) |
Intel Celeron; AMD Geode | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Uplogix remote management appliance utilizes Mozilla''s Network Security Services for general purpose cryptographic functionality. NSS provides the algorithms necessary to secure Uplogix'' SSH and TLS implementations. See http://www.uplogix.com" |
1444 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Jennifer Gilbert
|
Version 15.2(3)GC (Firmware) |
Freescale MPC8548E | 5/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Cisco 5940 ESR Air-Cooled Card, Cisco 5940 ESR Conduction-Cooled Card" 07/02/12: Updated implementation information; |
1443 | VMware, Inc. 3401 Hillview Avenue Palo Alto, CA 94304 USA -Eric Betts
|
Version 1.0 |
Intel® Xeon® EM64T w/ Microsoft® Windows® XP; Intel® Xeon® EM64T w/ Red Hat Enterprise Linux 5.1 | 5/12/2011 |
SHA-256 
(BYTE-only) "The PCoIP Cryptographic Module provides TLS and cryptographic services for protecting data traffic between a VMware View Client and a VMware View Server." |
1442 | Samsung Electronics Co., Ltd. San #16 Banwol-Dong Hwasung-City, Gyeonggi-Do 445-701 Korea -Timothy Markey
-JIsoo Kim
|
Version 1.0 (Firmware) |
S3C29MAX01 | 5/12/2011 |
SHA-256 
(BYTE-only) "SAMSUNG SSD PM810 SED FIPS 140 Module provides high-performance AES-256 cryptographic encryption and decryption of the data stored in NAND Flash via SATA interface, with up to 250MB/sec sequential read and 220MB/sec sequential write rates. The PM810 supports both the ATA Security Feature Set and TCG Opal SSC." |
1441 | Futurex 864 Old Boerne Road Bulverde, TX 78163 USA -Paul Enman
|
Version 4.0.0 (Firmware) Part # 9750-2075 |
Amcc PowerPC | 5/12/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The EXP9000 cryptographic module provides secure encryption, storage, and transmmission of sensitive data used in a wide variety of applications including Futurex Hardware Security Modules (HSM) and Key Management Servers (KMS)." |
1440 | SZZT Electronics Co., Ltd. SZZT Electronic Industrial Park Jiazitang, Songbai Road Guangming New District Shenzhen, Guangdong Province 518132 China -Yunchuan Qin
|
Version ZTA100FWLIB.0.1 (Firmware) |
VCS-MX Version D2009-12 Simulator | 5/12/2011 |
SHA-1     
(BIT) SHA-256  (BIT) SHA-512  (BIT) Bit only "ZTA100 Encryption Library is an encryption library that runs on ZTA100, which is an 8051 compatible processor. The Library utilizes the hardware cryptographic engine of the chip and provides standard algortihm services." |
1439 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Ashit Vora
|
Version 15.1(3)S5 (Firmware) |
MIPS R7000/SR71000 | 5/12/2011 |
SHA-1     
(BYTE-only) "IOS Firmware cryptographic implementations used within Cisco devices to provide cryptographic functions" 01/06/12: Updated implementation information; |
1438 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 (Firmware) |
Intel Xeon E5640 | 5/5/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Web Gateway Cryptographic Engine v1.0 provides the services necessary to support the cryptographic features and functions of McAfee''s line of anti-malware solutions, including the McAfee Web Gateway WG5000 and WG5500 appliances." |
1437 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 1.2 (Firmware) |
Intel Xeon | 5/5/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint SMS is a centeralized management solution for managing and monitoring a deployment of TippingPoint security devices. The SMS provides cryptographic services for communicating with the security devices and user interfaces. This implementation focuses on the OpenSSL cryptographic library used in the SMS." |
1436 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.12.6 (Firmware) |
Intel Xeon | 5/5/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint SMS is a centeralized management solution for managing and monitoring a deployment of TippingPoint security devices. The SMS provides cryptographic services for communicating with the security devices and user interfaces. This implementation focuses on the NSS cryptographic library which is used to implement a SUN JCE Provider." |
1435 | Open Source Software Institute 8 Woodstone Plaza, Suite 101 Hattiesburg, MS 39402 USA -John M. Weathersby, Jr.
|
Version 1.2.3 |
Motorola PowerPC 750GX w/ VxWorks 6.7 | 5/5/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website. It has been tested with both assembler optimization and without assembler optimization." |
1434 | McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 USA -Mark Hanson
|
Version 1.0 (Firmware) |
Intel Xeon E5660 | 4/27/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The McAfee Web Gateway Cryptographic Engine v1.0 provides the services necessary to support the cryptographic features and functions of McAfee''s line of anti-malware solutions, including the McAfee Web Gateway WG5000 and WG5500 appliances." |
1433 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.4R3 and 10.4R4 (Firmware) |
Cavium Octeon; | 4/27/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers. " 08/01/11: Update implementation information; |
1432 | Kanguru Solutions 1360 Main Street Millis, MA 02054 USA -Nate Cote
|
Version 1.0 (Firmware) Part # KN3000/3001 |
Kanguru KN3000/3001 | 4/20/2011 |
SHA-256 
(BYTE-only) "The Kanguru Defender 2000 is a hardware encrypted USB security device designed for secure data storage. It is also used as a platform to run secure virtual operating systems and applications." 11/15/11: Update implementation information; |
1431 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # SSG520M, SSG550M |
Cavium Nitrox-lite | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG-520M and SSG-550M are high-performance security platforms." |
1430 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # SSG-320M, SSG-350M |
Cavium Nitrox-lite | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG-320M and SSG-350M are high-performance security platforms." |
1429 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # SSG-5, SSG-20 |
Intel IXP625 | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG5 and SSG20 are high-performance security platforms." |
1428 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # SSG-140 |
Intel IXP2325 | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG-140 is a high-performance security platform." |
1427 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # NS-5200, NS-5400 |
Gigascreen 3 | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The ISG 1000 and 2000 are high-performance security platforms." |
1426 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 6.3 (Firmware) Part # ISG1000/ISG2000 |
Gigascreen 3 | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The ISG 1000 and 2000 are high-performance security platforms." |
1425 | Watchdata Technologies Pte Ltd Admirax 8 Admiralty Street #2-07/08 Singapore, Singapore 757438 Singapore -Jing Bai
-Haitao Cao
|
Version 1.0.0.1 (Firmware) |
Z32L256D32U | 4/20/2011 |
SHA-256 
(BYTE-only) "Watchdata-FIPS-TimeCOS Hardware Cryptographic Library provides core cryptographic functionality for Watchdata''s security products providing a capability to develop complex and flexible security applications." 04/27/11: Update vendor information; |
1424 | Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA -Sunil Chitnis
-Bob Colvin
|
Version NetIron 5.1.1a (Firmware) |
Freescale MPC8544E; Freescale MPC7447A | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Our Goal is to receive FIPS 140-2 SL2 certification (hardware category- tamper detection tape) on the above platforms. For this, we have identified the cryptographic boundary to be the management module (with access to E2PROM on backplane). The software is to be updated to use NSS/NSPR as the cryptographic engine." |
1423 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -John Bordwine
|
Version 1.0 |
Intel Pentium w/ Windows 2003 Server 32-bit; Sun UltraSPARC III w/ Solaris 10; Intel Xeon w/ RHEL 5 32-bit | 4/20/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec Cross-Platform Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec Cross-Platform Cryptographic Module. This module supports Symantec Applications by providing validated Cryptographic Services. The incorporation of these algorithms make these products ideal for enterprise and government applications." |
1422 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Kris Orr
|
Version 5.6 |
ARMv7 w/ QNX Neutrino 6.6 ;  Intel Celeron N2820 w/ QNX Neutrino 6.6; Freescale P1010 w/ QNX Neutrino 6.5 | 4/8/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder® FIPS Core provides application developpers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules." 02/25/15: Added new tested information; |
1421 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 5.6 |
ARMv7 w/ BlackBerry Tablet OS | 4/8/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Tablet Cryptographic Library is the software module that provides advanced cryptographic functionality to BlackBerry Tablets." |
1420 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -John Bordwine
|
Version 1.0 |
Intel Pentium 4 w/ Windows Server 2003 32-bit; Intel Xeon w/ Red Hat Enterprise Linux 4.8 32-bit | 3/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symantec SymCrypt Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec SymCrypt Cryptographic Module. This module supports Symantec Applications by providing validated and approved Cryptographic Services. The incorporation of these algorithms make these products ideal for enterprise and government applications." |
1419 | Avaya, Inc. 211 Mt. Airy Road Basking Ridge, NJ 07920 USA -Dragan Grebovich
-Rob Tashjian
|
Version 1.0 (Firmware) |
Freescale MPC8347A | 3/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Avaya''s Secure Router 2330 FW Cryptographic Library provides the cryptographic functionality needed to securely connect to, manage, and maintain the router device." |
1418 | Avaya, Inc. 211 Mt. Airy Road Basking Ridge, NJ 07920 USA -Dragan Grebovich
-Rob Tashjian
|
Version 1.0 (Firmware) |
Freescale MPC8541 | 3/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Avaya''s Secure Router 4134 FW Cryptographic Library provides the cryptographic functionality needed to securely connect to, manage, and maintain the router device." |
1417 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
|
Version 4.0 (Firmware) |
Intel® Xeon™ | 3/31/2011 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v4.0 runs on an Intel x86 compatible processor using the FortiMail OS." |
1416 | BAE Systems 2525 Network Place Herndon, VA 20171 USA -John Ata
|
Version 1.1 |
Intel Pentium D w/ STOP 7.3 Beta 1 | 3/31/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The STOP 7 Kernel Cryptographic Module provides cryptographic services that the STOP 7 kernel uses to implement random number generation and file system encryption." |
1415 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Clint Winebrenner
|
Version 1.2 |
Intel(R) Xeon(R) CPU @ 1.66GHz w/ Windriver Linux (2.6.27.10 kernel) | 3/31/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The openssl crypto library is used on the Nexus7K supervisor to implement crypto operations in software." |
1414 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
-Bishakha Banerjee
|
Version JUNOS_104 |
XLR 732 w/ JUNOS Microkernel; XLR 532 w/ JUNOS Microkernel | 3/14/2011 |
SHA-1     
(BYTE-only) "Juniper Networks® Multiservices PIC (MS-PIC) are modules that supply hardware accerleration for an array of packet processing-intensive services in the M Series and T Series router." |
1413 | TechGuard Security 743 Spirit 40 Park Drive Suite 206 Chesterfield, MO 63005 USA -David Maestas
|
Version v1.0 (Firmware) |
Intel Atom D510 1.66 Ghz, 1M Cache; Intel Xeon X3430 2.4 Ghz, 8M Cache, Turbo; 2X Intel Xeon E5620 2.4 Ghz, 12M Cache, Turbo, HT | 3/14/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The TechGuard PoliWall Cryptographic Userspace Module provides user-space cryptographic services for the PoliWall-CCF systems. The module performs the cryptographic functions used to establish SSL connections, verify digital signatures of firmware and encrypted private keys in the on-disk keystore." 08/25/11: Add new tested information; |
1412 | TechGuard Security 743 Spirit 40 Park Drive Suite 206 Chesterfield, MO 63005 USA -David Maestas
|
Version 1.0 (Firmware) |
Intel Atom D510 1.66 Ghz, 1M Cache; Intel Xeon X3430 2.4 Ghz, 8M Cache, Turbo; 2X Intel Xeon E5620 2.4 Ghz, 12M Cache, Turbo,HT | 3/14/2011 |
SHA-1     
(BYTE-only) "The TechGuard PoliWall Cryptographic Kernel Module provides kernel cryptographic services for the PoliWall-CCF systems. The module performs the cryptographic functions used for IPSec connections." |
1411 | Klas Ltd 1101 30th Street NW Suite 320 Washington, DC 20007 USA -Frank Murray
|
Version 5.1f (Firmware) |
Intel XScale IXP425 | 3/14/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "KlasRouter is a low-power secure router providing Virtual Private Networking (including IPSec Suite-B algorithms), WAN Acceleration, VLAN and a host of other networking features in a compact package. KlasRouter is standards-based and hence interoperable with any infastructure." |
1410 | RSA, The Security Division of EMC 174 Middlesex Turnpike Bedford, MA 01730 USA -Damon Hopley
|
Version 1.0 |
Intel Pentium M Processor w/ Microsoft Windows 7 (32-bit); AMD Athlon 64 X2 Dual Core Processor w/ Microsoft Windows 7 (64-bit) | 3/8/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The RSA BSAFE CNG Cryptographic Primitives Library is a drop-in replacement for the Microsoft user-mode CNG provider. It can be dynamically linked into applications by software developers to permit the use of general purpose cryptography." |
1409 | N/A | N/A | N/A | 3/8/2011 | N/A |
1408 | Brocade Communication Systems, Inc. 120 Holger Way San Jose, CA 95110 USA -Vidya Sagar Ravipati
|
Version OpenSSL V1.0 (Firmware) |
AMCC PPC440EPX | 3/8/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "AES128-CBC, AES192-CBC, AES256-CBC; HMAC SHA-1, HMAC SHA-256, HMAC SHA-512; ANSI X9.31; RSA Key Generation, Signature and Verification; SHA1, SHA256 and SHA512; TDES-CBC" |
1407 | Brocade Communication Systems, Inc. 120 Holger Way San Jose, CA 95110 USA -Vidya Sagar Ravipati
|
Version FIPS OpenSSL V1.0 (Firmware) Part # Freescale MPC8548EPX |
FREESCALE MPC8548EPX | 3/8/2011 |
SHA-512 
(BYTE-only) "AES128-ECB, AES192-ECB AES256-ECB; HMAC SHA-512; SHA512" |
1406 | N/A | N/A | N/A | 3/8/2011 | N/A |
1405 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 1.1 |
Intel(R) Xeon(TM) w/ EMBSYS (TM) Carrier Grade Embedded Linux V3 | 2/24/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UPCL (Unified Platform Cryptographic Library) on intel platform provides the cryptographic API to Net elements'' applications running on series of intel multi-core processors." |
1404 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 1.1 |
AMD Opteron(R) w/ EMBSYS(TM) Carrier Grade Embedded Linux V3 | 2/24/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UPCL(Unified Platform Cryptographic Library) on AMD platform provides the cryptographic API to Net elements'' applications running on series of AMD multi-core processors" |
1403 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 4.11.10 |
NewStart CGS Linux V3.02 with Sun JDK/JRE 1.6.0_11 | 2/24/2011 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UEPCM (Unified Element Management Platform Cryptographic Module) on Intel platform provides the cryptographic API to Net Management applications running on the series of Intel multi-core processors." 07/07/11: Update implementation information; |
1402 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 4.11.10 |
NewStart CGS Linux V3.02 with Sun JDK/JRE 1.6.0_11 | 2/24/2011 |
SHA-1     
(BIT) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UEPCM (Unified Element Platform Cryptographic Module) on AMD platform provides the cryptographic API to Net Management applications running on series of AMD multi-core processors." 07/07/11: Update implementation information; |
1401 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Iain Holness
|
Version 3.00.03 (Firmware) |
StrongARM 80xxx | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The firmware implementation is used by the SafeNet ProcestServer Gold and ProtectServer Interal-Express to provide a wide range of cryptographic functions." |
1400 | Emulex 3333 Susan St. Costa Mesa, CA 92626 USA -Larry Hofer
|
Version Revision 648 (Firmware) |
ARM 1156 | 2/24/2011 |
SHA-256 
(BYTE-only) "The LPSE12002 OneSecure Encryption HBA is a cryptographic capable Fibre Channel Host Bus Adapter (HBA) including the AES, HMAC and SHA implementations. In the future, additional products may include one or more of these implementations." |
1399 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Tom Price
|
Version 15.1(2)T3 (Firmware) |
Intel 82576 | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 3900 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments" |
1398 | Thales E-Security Ltd Jupiter House Station Road Cambridge, CB5 8JJ UK -Marcus Streets
-Mark Wooding
|
Version 2.50.16 (Firmware) |
Motorola PowerPC | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The nShield algorithm library provides cryptographic functionality for Thales''s nShield Hardware Security Modules" |
1397 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.4R3 and 10.4R4 (Firmware) |
Intel Celeron | 2/24/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 04/25/11: Update implementation information; |
1396 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.4R3 and 10.4R4 (Firmware) |
Intel Celeron | 2/24/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 04/25/11: Update implementation information; |
1395 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.4R3 and 10.4R4 (Firmware) |
RMI XLR processor | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 04/25/11: Update implementation information; |
1394 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 2.3 (Firmware) |
Bluefly Processor | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." 04/23/12: Updated vendor information; |
1393 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.4R3 and 10.4R4 (Firmware) |
RMI XLR | 2/24/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." 04/25/11: Update implementation information; |
1392 | Xceedium, Inc. 30 Montgomery Street Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
|
Version 1.2+5.2.1 (Firmware) |
Intel Core(TM) 2 Duo | 2/3/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''''s." |
1391 | XYPRO Technology Corporation 3325 Cochran Street, Suite #200 Simi Valley, CA 93063 USA -Lisa Partridge
-Scott Uroff
|
Version 3.3.2 |
MIPS R10000 w/ HP Nonstop Server G06 OSS Non-PIC; MIPS R10000 w/ HP Nonstop Server G06 Non-PIC; HP PA-RISC 8800 w/ HP-UX 11.11; IBM Power3 w/ AIX 5.2; Intel Itanium2 w/ HP Nonstop Server H06; MIPS R10000 w/ HP Nonstop Server G06; Intel Itanium 9100 w/ HP Nonstop Server J06 OSS; Intel Itanium2 w/ HP Nonstop Server H06 OSS; Intel Xeon w/ SuSE Enterprise Linux 10; Intel Core2 Duo w/ Windows XP w/SP3; Sun UltraSPARC IIIi w/ Solaris 10; Intel Xeon MP w/ Red Hat Enterprise Linux v5.1; IBM Z9 Model 2049-S28 w/ IBM z/OS 1.11; HP PA-RISC 8500 w/ HP-UX 10.2; MIPS R10000 w/ HP Nonstop Server G06 OSS; Intel Itanium 9100 w/ HP Nonstop Server J06 | 2/3/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The XYGATE Encryption Software Development Kit [X /ESDK] is a dynamically linked software library that provides: AES and Triple DES symmetric key encryption; SHA-1 and SHA-256 hashing; RSA public key encryption; digital signing with RSA and DSA; secure session protocols like SSH, SSL, and TLS; and email protocols such as PGP and S/MIME." |
1390 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 2.0 (Firmware) |
ARM 926EJS | 2/3/2011 |
SHA-1     
(BYTE-only) "Oracle StorageTek T10000C Tape Drive." |
1389 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 2.0 (Firmware) |
ARM 926EJS | 2/3/2011 |
SHA-1     
(BYTE-only) "Oracle StorageTek T10000C Tape Drive." |
1388 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Michael Cox
-Huey Ngo
|
Version 1.1 (Firmware) |
Intel® Xeon™ | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." |
1387 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.2 (Firmware) |
Intel Xeon E5520 2.27GHz | 1/26/2011 |
SHA-1     
(BYTE-only) "The TippingPoint SMS is a centeralized management solution for managing and monitoring a deployment of TippingPoint security devices. The SMS provides cryptographic services for communicating with the security devices and user interfaces. " |
1386 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.2 (Firmware) |
Intel Xeon E5520 2.27GHz | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint SMS is a centeralized management solution for managing and monitoring a deployment of TippingPoint security devices. The SMS provides cryptographic services for communicating with the security devices and user interfaces. " |
1385 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.2 (Firmware) |
Intel Xeon E5520 2.27GHz | 1/26/2011 |
SHA-1     
(BYTE-only) "The TippingPoint SMS is a centeralized management solution for managing and monitoring a deployment of TippingPoint security devices. The SMS provides cryptographic services for communicating with the security devices and user interfaces. " |
1384 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.1.4 (Firmware) |
Intel Celeron-M 600MHz | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The TippingPoint 10 Intrustion Prevention System (IPS) operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. The IPS provides cryptographic services to protect the management of the device." |
1383 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.1.4.1427 (Firmware) |
Intel Celeron | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implementation Description - The TippingPoint Crypto Implementation provides cryptographic services to TippingPoint devices such as Intrusion Prevention Systems (IPS), which operate in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded." 02/02/11: Update implementation information; |
1382 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.1.4.1427 (Firmware) |
Intel Core 2 Duo | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implementation Description - The TippingPoint Crypto Implementation provides cryptographic services to TippingPoint devices such as Intrusion Prevention Systems (IPS), which operate in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded." 02/01/11: Update implementation information; |
1381 | Hewlett-Packard TippingPoint 7501 N. Capital of Texas Highway Austin, TX 78737 USA -Dinesh Vakharia
-Freddie Jimenez Jr.
|
Version 3.2.0.1530 (Firmware) |
NetLogic XLR | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implementation Description - The TippingPoint Crypto Implementation provides cryptographic services to TippingPoint devices such as Intrusion Prevention Systems (IPS), which operate in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded." 02/10/11: Update implementation information; |
1380 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 2.3.9 |
Intel Pentium D w/ Red Hat Enterprise Linux 5 | 1/26/2011 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "F-Secure Kernel Mode Cryptographic Driver is a FIPS 140-2 Level 1 validated software module, implemented as a 32-bit Linux kernel object. When loaded into computing system memory, it resides at the kernel mode level of the Linux OS and provides a set of cryptographic services accessible through a C-language API." |
1379 | Cavium Networks 805 E Middlefield Road Mountain View, CA 94109 USA -Michael Scruggs
|
Part # Nitrox PX Series Die V1.2 |
N/A | 1/13/2011 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NITROX PX implements algorithms in hardware in each of several identical processor cores: SHA and MD5 hash/HMAC, 3 DES/AES256 encryption, and ModMul/ModEx/RSA pkcs 1 v15. IPSec, SSL, and WLAN protocols are aslo accelerated. Performance ranges available: 500Mbps to 2.5 Gbps encryption and/or hash; 4K to 17K RSA ops/sec; 6K to 25K DH ops/sec." |
1378 | Acme Packet, Inc. 100 Crosby Drive Bedford, MA 01730 USA -Prashant
|
Part # BCM5862 |
N/A | 1/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Acme Packet''s FIPS-validated Session Border Controller provides critical control functions to deliver trusted, first-class interactive communications-: voice, video and multimedia sessions -across IP network borders." |
1377 | Netlib 1177 High Ridge Road Suite 428 Stamford, CT 06905 USA -Neil Weicher
|
Version 2010.501.10.0 |
Intel Xeon Quad Core w/Windows 2003 x64; Intel Xeon Quad Core w/Windows 2008 x64; Intel Xeon Quad Core w/ Windows 7 x64 | 1/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Netlib Encryptionizer 2010.201.10.0 provides encryption of data stored in servers, clouds, desktops, laptops and backups. It can be deployed without programming and without adding any administrative overhead." |
1376 | Netlib 1177 High Ridge Road Suite 428 Stamford, CT 06905 USA -Neil Weicher
|
Version 2010.201.10.0 |
Intel Xeon Quad Core w/Windows 2003 x86; Intel Xeon Quad Core w/Windows 2008 x86; Intel Xeon Quad Core w/ Windows 7 x86; Intel Xeon Quad Core w/ Windows Server 2000 x86 | 1/13/2011 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "The Netlib Encryptionizer 2010.201.10.0 provides encryption of data stored in servers, clouds, desktops, laptops and backups. It can be deployed without programming and without adding any administrative overhead." |
1375 | Centrify Corporation 785 N Mary Avenue Suite 200 Sunnyvale, CA 94085 USA -Keith Moreau
|
Version 1.0 |
Intel Core 2 Duo, 1.83 GHZ w/ Mac OS X 10.6.4; Intel I7-870 w/ Red Hat Enterprise Linux ES release 4; Intel I7-870 w/ Red Hat Enterprise Linux ES v5; Intel Core 2 Duo, 1.83 GHZ w/ Mac OS X 10.6.5 | 1/13/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Centrify Cryptographic Module provides the cryptographic services for all of Centrify''s products." 02/10/11: Add new tested information; |
1374 | Concepteers LLC 121 Newark Ave, Suite 204 Jersey City, New Jersey 07302 USA -David Van
-Seth Dyer
|
Version 2.0 (Firmware) |
Intel Core 2 Quad | 1/6/2011 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Teleconsole E is a secure, remote diagnostic access (SRDA) gateway designed to provide telemaintenance capabilities to internal equipment and network resources. Communication from the client to the Teleconsole is secured with FIPS 140-2 certified encryption." 02/22/11: Update implementation information; |
1373 | Acme Packet, Inc. 100 Crosby Drive Bedford, MA 01730 USA -Prashant Kumar
|
Version C6.3 (Firmware) |
Intel Core Duo T2500 | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Acme Packet''s FIPS-validated Session Border Controller provides critical control functions to deliver trusted, first-class interactive communications-: voice, video and multimedia sessions -across IP network borders." |
1372 | Acme Packet, Inc. 100 Crosby Drive Bedford, MA 01730 USA -Prashant Kumar
|
Version C6.3 (Firmware) |
Intel Celeron M 440 | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "Acme Packet''s FIPS-validated Session Border Controller provides critical control functions to deliver trusted, first-class interactive communications-: voice, video and multimedia sessions -across IP network borders." |
1371 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Bill Rettig
|
Version 4.0 |
Intel® Core 2 Xeon[tm] Quad Core w/ Linux | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The 3eTI 3e-030-2 V4.0 Security Server authenticates 802.1X supplicants using TLS-based EAP methods." |
1370 | AirTight® Networks 339 N. Bernardo Avenue Suite 200 Mountain View, CA 94043 USA -Hemant Chaskar
|
Version 6.5.27 (Firmware) |
Intel® Core 2 Xeon[tm] Quad Core | 12/27/2010 |
SHA-1     
(BYTE-only) "The module performs wireless intrusion detection and prevention. It monitors wireless devices and traffic to ensure conformance of wireless activity to security policy; mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks" |
1369 | Concepteers LLC 121 Newark Ave, Suite 204 Jersey City, New Jersey 07302 USA -David Van
-Seth Dyer
|
Version 2.0 (Firmware) |
Intel Atom | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "The Teleconsole S6U4W is a secure, remote diagnostic access (SRDA) gateway designed to provide telemaintenance capabilities to internal equipment and network resources. Communication from the client to the Teleconsole is secured with FIPS 140-2 certified encryption." |
1368 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 2.3.9 |
Intel Pentium D w/ Windows Server 2008 with Service Pack 2 | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "F-Secure Kernel Mode Cryptographic Driver is a FIPS 140-2 Level 1 validated software module, implemented as a 64-bit Windows export driver. When loaded into computing system memory, it resides at the kernel mode level of the Windows OS and provides a set of cryptographic services accessible by other kernel mode drivers through a C-language API." |
1367 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Akifumi Mishima
|
Version 1.0.0 (Firmware) Part # NA |
Xilinx Virtex-6 FPGA | 12/27/2010 |
SHA-1     
(BYTE-only) "Sony IMB SHS Core-V2 is the firmware module for digital cinema system." |
1366 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Akifumi Mishima
|
Version 1.0.0 (Firmware) Part # Xilinx Virtex-6 FPGA |
Xilinx Virtex-6 FPGA | 12/27/2010 |
SHA-256 
(BYTE-only) "Sony IMB SHS Core-V1 is the firmware module for digital cinema system." |
1365 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Akifumi Mishima
|
Version 1.0.0 (Firmware) Part # NA |
Altera Cyclone III FPGA | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sony IMB SHS Core-C is the firmware module for digital cinema system." |
1364 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Akifumi Mishima
|
Version 1.0.0 (Firmware) Part # NA |
SH-4A w/ Linux kernel 2.6 | 12/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sony IMB SHS Core-S is the software module for digital cinema system." |
1363 | Comtech EF Data Corporation 2114 West 7th Street Tempe, Arizona 85281 USA -Wallace Davis
|
Version 1.2.0 (Firmware) |
AMCC PowerPC 440EP | 12/16/2010 |
SHA-1     
(BYTE-only) "The Comtech EF Data FIPS Security Module features an FPGA to perform bulk encryption/decryption for HDLC data traffic via the SLM-5650 Satellite Router, as well as firmware to provide the cryptographic functions needed to act as a endpoint for TLS management and control traffic." |
1362 | Open Source Software Institute 8 Woodstone Plaza, Suite 101 Hattiesburg, MS 39402 USA -John Weathersby
|
Version 1.2.2 |
ARM 7 w/ Android 2.2 | 12/16/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website. It has been tested with both assembler optimization and without assembler optimization." 04/05/11: Update implementation information; |
1361 | IBM Corporation 9032 S Rita Road Tucson, AZ 85744 USA -David L. Swanson
|
Version 1.0 (Firmware) |
IBM PowerPC 405 | 12/16/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO Ultrium 5 tape drive." |
1360 | IBM Corporation 9032 S Rita Road Tucson, AZ 85744 USA -David L. Swanson
|
Version 1.0 (Firmware) |
IBM PowerPC 405 | 12/16/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO Ultrium 5 tape drive." |
1359 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Tom Price
|
Version 15.1(2)T2Aand 15.1(2)T3 (Firmware) |
Freescale MPC8358E; Freescale MPC8572E; Cavium Octeon Processor | 12/6/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 800 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments." 07/12/11: Add new tested implementation information; |
1358 | Fortress Technologies, Inc. 1 Technology Park Drive Westford, MA 01886 USA -Certification Director
|
Version 2.0 (Firmware) |
Xilinx Spartan FPGA | 12/6/2010 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) Implementation does not support zero-length (null) messages. "The Fortress Cryptographic Implementation suite (AES, SHA, HMAC and RNG) all work in unison to provide security to your wireless and wired network." |
1357 | General Dynamics C4 Systems 77 A Street Needham, MA 02494 USA -David Aylesworth
|
Version 2.0 (Firmware) |
RMI Alchemy MIPS Processor; Broadcom XLS Processor | 12/6/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Fortress Cryptographic Implementation suite works in unison to provide security to your wireless and wired networks." 11/06/14: Updated vendor and implemenation information; |
1356 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
|
Version 1.2+5.2.0 (Firmware) |
Intel Core(TM) 2 Duo | 11/23/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''s." |
1355 | General Dynamics C4 Systems 77 A Street Needham, MA 02494 USA -David Aylesworth
|
Version 2.0 (Firmware) |
RMI Alchemy MIPS Processor; Broadcom XLS Processor | 11/23/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Fortress Cryptographic Implementation suite works in unison to provide security to your wireless and wired networks." 11/05/2014: Updated vendor and implementation information; |
1354 | Mxtran Inc. 9F, No.16, Li-Hsin Road, Science Park Hsin-chu, Taiwan 300 Taiwan, R.O.C. -C.W. Pang
|
Version 1.0 (Firmware) |
Mxtran MX11E25664E | 11/16/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Mxtran Payeeton Library for MX11E25664E provides the cryptographic functionality found in Mxtran MX11E25664E processor." |
1353 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.4f |
Intel Core2 Duo w/ VxWorks 6.7; ARM v7 w/ Android 2.2; PowerQuicc III w/ VxWorks 5.5; Freescale e600 w/ VxWorks 5.5; PowerQuicc II Pro w/ VxWorks 6.2; PowerQuicc III w/ VxWorks 6.4; PowerQuicc II w/ VxWorks 6.4; Intel XScale PXA w/ VxWorks 6.4; Freescale e500 w/ Wind River 4.0 using Linux 2.6.34 | 11/16/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NanoCrypto is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." 05/26/11: Add new tested information; |
1352 | Rockwell Collins, Inc. 400 Collins Road, MS 183-100 Cedar Rapids, IA 52411 USA -Verl Day
-Ron Broden
|
Version 811-4562-004 (Firmware) |
Analog Devices BF561 | 11/16/2010 |
SHA-1     
(BYTE-only) "The Rockwell Collins DVP-200 Digital Voice Privacy processor provides a unique combination of data and voice privacy with crystal-clear audio quality that is fully compatible with HF, VHF, UHF and other narrowband communications channels." 06/14/11: Add new tested information; update vendor information; |
1351 | Pierson Capital Technology, LLC and Pierson Capital Technology (Beijing), LTD
(Beijing), LTD Centerville Road, Suite 400 Wilmington, Delaware 19808 USA Level 18, Suite 9, Oriental Plaza 1, East Chang An Avenue, Dong Cheng District, Beijing 100738 P.R. China -Frank Psaila
-Frank Psaila
|
Version MIIKOO Device Algorithm Library V2.1 (Firmware) |
Synochip AS602 | 11/16/2010 |
SHA-256 
(BYTE-only) "MIIKOO device combines fingerprint recognition and additional cryptography capabilities to generate Dynamic PINs. It is compatible with any type of smart card, magnetic stripe or contact-less cards by seamlessly providing the added biometrical triggering of dynamic PIN security over the existing financial transaction network." |
1350 | Quantum Corporation 1650 Technology Drive Suite 700 San Jose, CA 95110 US -Steve McKissick
|
Version 3.0.0 |
Intel Xeon w/ rPath linux 2.6.29 64-bit | 10/26/2010 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Scalar OpenSSL FIPS Library is a software library based on an unmodified version of FIPS compliant OpenSSL." |
1349 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 4.10.30 |
Intel(R) Xeon(TM) w/ NewStart CGS Linux V3 | 10/26/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UEPCM (Unified Element Management Platform Cryptographic Module) on Intel platform provides the cryptographic API to Net Management applications running on the series of Intel multi-core processors." |
1348 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 4.10.30 |
AMD Opteron(R) w/ NewStart CGS Linux V3 | 10/26/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UEPCM (Unified Element Platform Cryptographic Module) on AMD platform provides the cryptographic API to Net Management applications running on series of AMD multi-core processors." |
1347 | ActivIdentity, Inc. 6623 Dumbarton Circle Fremont, CA 94555 USA -Jean-Luc Azou
|
Version 1.7.0.4 |
ARM920Tid w/ Technologic Systems(R) TS-Linux | 10/26/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) Implementation does not support zero-length (null) messages. "The Cryptographic Module for F5 and C5 provides the cryptographic algorithm implementation." |
1346 | Francotyp-Postalia GmbH Triftweg 21-26 Birkenwerder, 16547 Germany -Dirk Rosenau
-Hasbi Kabacaoglu
|
Version 1.1 (Firmware) |
Maxim IC0400 | 10/26/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The firmware implementation of the FP mCrytoLibrary, which runs on an embedded hardware module, with a Maxim IC0400 processor. The cryptographic algorithm implementation is used in the context of security critical services." |
1345 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Tom Nguyen
|
Version R01.00.00 (Firmware) Part # 51009397004 |
Motorola, Inc. 51009397004 | 10/18/2010 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) "The KVL 4000 PIKE2 provides security services for the KVL 4000. The KVL 4000 is a portable key distribution device that consists of a Personal Digital Assistant (PDA) and Security Adapter that connects to the PDA." |
1344 | Brocade Communications Systems, Inc. 1745 Technology Drive San Jose, CA 95110 USA -Joseph Shaheen
|
Version swrel_main_090108_2222 (Firmware) Part # CN5750 |
Cavium, Octeon, CN5750 | 10/18/2010 |
SHA-512 
(BYTE-only) "Brocade_FCIP_HMAC_SHA512 implementation" |
1343 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 1.3.2f (Firmware) |
Freescale 7448 PowerPC | 10/18/2010 |
SHA-1     
(BYTE-only) True "The Lexmark PrintCryption is an option for the Lexmark printers that enables the transfer and printing of encrypted print jobs." 11/05/10: Update implementation information; |
1342 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 Olympia, WA 98501 US -Patrick Townsend
|
Version 3.0.0 |
Intel CORE 2 DUO w/ rPath Linux 2.6.29 64-bit | 10/18/2010 |
SHA-1     
(BYTE-only) "Alliance OpenSSL FIPS Library is a software library based on an unmodified version of FIPS compliant OpenSSL." |
1341 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 1 |
AMD Opteron(R) w/ EMBSYS(TM) Carrier Grade Embedded Linux V3.0 | 10/18/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UPCL(Unified Platform Cryptographic Library) on AMD platform provides the cryptographic API to Net elements'' applications running on series of AMD multi-core processors" |
1340 | ZTE NO. 55, Hi-tech Road South ShenZhen, Guangdong 518057 P.R.China -Royce Wang
|
Version 1 |
Intel(R) Xeon(TM) w/ EMBSYS (TM) Carrier Grade Embedded Linux V3.0 | 10/18/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "UPCL (Unified Platform Cryptographic Library) on intel platform provides the cryptographic API to Net elements'' applications running on series of intel multi-core processors." |
1339 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Joel Tang
|
Version 03.01.10 (Firmware) Part # DT4000 v1.0 |
DT4000 v1.0 | 10/4/2010 |
SHA-256 
(BYTE-only) "Kingston''''s DataTraveler DT4000 Series USB Flash Drive is assembled in the US for organizations that require a secure way to store and transfer portable data. The stored data is secured by hardware-based AES-256 encryption to guard sensitive information in case the drive is lost or stolen." |
1338 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.0 |
Intel Xeon E5640 w/ CentOS v4.3 | 10/4/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP Enterprise Secure Key Manager (ESKM) automates key generation and management. It is a hardened security appliance delivering identity-based access, administration and logging. Additionally, the ESKM provides reliable lifetime key archival with automatic multi-site key replication and failover capabilities." 08/29/11: Update vendor information; |
1337 | Exar Inc 48720 Kato Road Fremont, CA 94538 USA -Ken Davenport
-Ray Savarda
|
Part # 9150 |
N/A | 10/4/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Exar 9150 is a flowthru system on a chip implementation of IPsec, SRTP and MACsec. This family of security processors allows easy integration of complete bump-in-the-wire security into any product requiring the supported security functions, and includes on-chip IKE." |
1336 | Exar Inc 48720 Kato Road Fremont, CA 94538 USA -Ken Davenport
-Ray Savarda
|
Part # 9155 |
N/A | 10/4/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) Implementation does not support zero-length (null) messages. "The Exar 9155 is a flowthru system on a chip implementation of IPsec, SRTP and MACsec. This family of security processors allows easy integration of complete bump-in-the-wire security into any product requiring the supported security functions, and includes on-chip IKE." |
1335 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada -Iain Holness
|
Version MAL000000E |
Intel Pentium 4 w/ Fedora Core 3 | 9/27/2010 |
SHA-256 
(BYTE-only) "The MAL Cryptographic Library implements the RSA and SHA-256 cryptographic algorithms." |
1334 | Cisco Systems, Inc. 175 W Tasman Drive San Jose, CA 95134 USA -Jennifer Gilbert
|
Version 3.12.5 and 3.12.5.1 |
Intel Core 2 Duo w/ Cisco CARS 1.2.0.182 | 9/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic library" 03/25/13: Update implementation information; |
1333 | Cisco Systems, Inc. 175 W Tasman Drive San Jose, CA 95134 USA -Jennifer Gilbert
|
Version 1.1, 1.2 and 1.3 |
Intel Core 2 Duo w/ Cisco CARS 1.2.0.182 | 9/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "General purpose cryptographic library" 04/13/11: Update implementation information; |
1332 | Feitian Technologies Co., Ltd. 5th Floor Building 7A No. 40 Xueyuan Road Haidan District Beijing, Beijing 100191 China -Tibi Zhang
-Xiaozhi Zheng
|
Version 0.0.5.6 (Firmware) |
ST Visual Develop BR6 | 9/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Feitian-FIPS-COS Hardware Cryptographic Library provides cryptographic algorithm support to the Feitian-FIPS-COS cryptographic module." |
1331 | Xerox Corporation MS 801-81A 1350 Jefferson Road Rochester, New York 14618 USA -Larry Kovnat
-Alan Sukert
|
Version 1.0 |
Freescale MPC8545 w/ WindRiver Linux Kernel version 2.6.20; AMD Athlon w/ WindRiver Linux kernel version 2.6.20 | 9/27/2010 |
SHA-1     
(BYTE-only) "The Xerox cryptographic system based on OpenSSL is used to secure network traffic into and out of the device." |
1330 | Sony Corporation 1-7-1 Konan Minato-ku, Tokyo 108-0075 Japan -Akifumi Mishima
|
Version 1.0.0 (Firmware) |
Altera Stratix II FPGA | 9/27/2010 |
SHA-1     
(BYTE-only) "The Sony Security Module SHA Core-S is the firmware module for digital cinema system." |
1329 | Motorola, Inc. 1150 Kifer Road Sunnyvale, CA 94086-5312 USA -Ashot Andreasyan
|
Version OpenSSL0.9.8.b |
Freescale MPC-8568E w/ Motorola, Inc. EOS | 9/21/2010 |
SHA-1     
(BYTE-only) "The GGM8000 cryptographic algorithm suite is used to securely transfer data and voice traffic over public networks; to securely manage the device; and to store sensitive information." |
1328 | RSA, The Security Division of EMC 2831 Mission College Blvd. Santa Clara, CA 95054 USA -Kathy Kriese
|
Version 5.0 |
AMD Athlon(TM) 64 X2 Dual Core Processor w/ Microsoft Windows XP Professional SP3, Sun JRE 6.0; AMD Athlon(TM) 64 X2 Dual Core w/ Microsoft Windows XP Professional SP3, Sun JRE 5.0 | 9/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" |
1327 | Fortinet 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Part # CP-5 |
N/A | 9/21/2010 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-5" |
1326 | Xirrus, Inc. 2101 Corporate Center Drive Thousand Oaks, CA 91320 USA -Steve Smith
|
Version 4 |
Freescale MPC8540 w/ Linux 2.6.24 | 9/9/2010 |
SHA-1     
(BYTE-only) "The Xirrus Wi-Fi Array consists of 4, 8, 12, or 16 802.11abg access points coupled to a directional antenna system, and integrated together with a multi-gigabit switch, controller, firewall, threat sensor, and spectrum analyzer into a single, easy-to-install device." |
1325 | Xirrus, Inc. 2101 Corporate Center Drive Thousand Oaks, CA 91320 USA -Steve Smith
|
Version 5 |
Freescale MPC8540 w/ Linux 2.6.24 | 9/9/2010 |
SHA-1     
(BYTE-only) "The Xirrus Wi-Fi Array consists of 4, 8, 12, or 16 802.11abgn access points coupled to a directional antenna system, and integrated together with a multi-gigabit switch, controller, firewall, threat sensor, and spectrum analyzer into a single, easy-to-install device." |
1324 | Ciena Corporation 3500 Carling Ave. Nepean, Ontario K2H 8E9 Canada -Mark Kettle
-Bao-Chau Nguyen
|
Version 4.2f (Firmware) |
Power QUICC II | 9/9/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "A hybrid software/hardware/firmware cryptographic module supporting encryption and authentication end-to-end secure services across networks." |
1323 | Thales e-Security Meadow View House, Crendon Industrial Estate, Long Crendon Aylesbury, Buckinghamshire HP18 9EQ UK -Tim Fox
|
Version 1.0 (Firmware) |
Freescale MPC8548 Family | 9/9/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Thales e-Security implements this algorithm for applications running on its Thales Secure Processing Platform (TSPP) providing secure cryptographic resources to products in the Thales e-Security portfolio, including the payShield 9000 HSM family." |
1322 | N/A | N/A | N/A | 9/9/2010 | N/A |
1321 | Ultra Stereo Labs, Inc. 181 Bonetti Drive San Luis Obispo, CA 93401-7397 USA -David J. Cogley
|
Part # AMCC PPC 460GT |
N/A | 9/9/2010 |
SHA-1     
(BYTE-only) True "IMB-1200 HFR, IMB-1000 HFR" 02/21/12: Updated implementation information; |
1320 | Ultra Stereo Labs, Inc. 181 Bonetti Drive San Luis Obispo, CA 93401-7397 USA -David J. Cogley
|
Version OpenSSL 0.9.8m (FIPS)(Firmware) |
AMCC PPC 460 GT | 9/9/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) True "IMB-1200 HFR, IMB-1000 HFR" 02/21/12: Updated implementation information; |
1319 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Ambrose
|
Version NGX R66.1 with hotfix 1 (Firmware) |
Intel® Core(TM)2 Duo | 9/9/2010 |
SHA-1     
(BYTE-only) "Check Point Connectra that unifies SSL VPN, IPSec VPN, and integrated intrusion prevention for secure connectivity for mobile and remote workers while protecting enterprise networks and endpoints from external threats. Connectra includes centralized management and DynamicID SMS authentication." |
1318 | Qube Cinema, Inc. 4640 Lankershim Blvd Suite 601 N. Hollywood, CA 91602 USA -Andre Lopes
|
Version 1.0 |
Xilinx Embedded PowerPC 405 w/ Linux 2.6 | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The QubeCryptoLib provides the cryptographic functionalityfound in Qube products. It implements support for RSADigital Signature generation/verification, AES " |
1317 | Sophos PLC The Pentagon Abingdon Science Park Abingdon, Oxfordshire OX14 3YP United Kingdom -Joachim Schneider
-Mike Morra
|
Version 5.60 |
Intel Core 2 Duo w/ Windows 7 Ultimate Edition 64-bit; Intel Core 2 Duo w/ Windows 7 Ultimate Edition 32-bit; Intel Pentium 4 w/ FreeBSD 6.1 | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SafeGuard Cryptographic Engine is the core cryptographic component of Sophos'' Encryption products. It provides a solid implementation of standard algorithms used for disk and file encryption, key generation, key management, and integrity protection." |
1316 | Hughes Network Systems, LLC. 11717 Exploration Lane Germantown, MD 20876 USA -Shayla Fahey
|
Version 1.0 (Firmware) |
Toshiba TX4955 | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Hughes Firmware Crypto Engine (HFCE) for Hughes HN and HX systems enables end-to-end bidirectional encryption between a remote site and the enterprise data center, while still allowing the use of satellite acceleration and other HN and HX features. The HFCE uses AES for encryption and IKE to auto-generate and refresh session keys." |
1315 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 2.2 (Firmware) |
Bluefly Processor | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." 04/23/12: Updated vendor information; |
1314 | Hughes Network Systems, LLC. 11717 Exploration Lane Germantown, MD 20876 USA -Shayla Fahey
|
Version 1.0 |
Intel® Pentium® 4 w/ Microsoft® Windows Server® 2008 | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Hughes Crypto Engine (HCE) for Hughes HN and HX systems enables end-to-end bidirectional encryption between a remote site and the enterprise data center, while still allowing the use of satellite acceleration and other HN and HX features. The HCE uses AES for encryption and IKE to auto-generate and refresh session keys." |
1313 | eIQNetworks, Inc. 31 Nagog Park Acton, MA 01720 USA -n/a |
Version 1.2 |
Intel Core 2 Duo w/ Windows Server 2008 Standard Edition | 8/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SecureVue module are EXEs which use wrappers around FIPS compliant OPENSSL code to provide cryptographic capabilities. Encryption, Decryption, Key Generation and Key Exchange/Communication are all done using OPENSSL code." |
1312 | Sophos PLC The Pentagon Abingdon Science Park Abingdon, Oxfordshire OX14 3YP United Kingdom -Joachim Schneider
-Mike Morra
|
Version 5.60 |
Intel Core 2 Duo w/ Windows 7 Ultimate Edition 64-bit; Intel Core 2 Duo w/ Windows 7 Ultimate Edition 64-bit; Intel Core 2 Duo w/ Windows 7 Ultimate Edition 32-bit; Intel Pentium 4 w/ FreeBSD 6.1 | 8/12/2010 |
SHA-256 
(BYTE-only) "SafeGuard Cryptographic Engine is the core cryptographic component of Sophos'' Encryption products. It provides a solid implementation of standard algorithms used for disk and file encryption, key generation, key management, and integrity protection." |
1311 | Sophos PLC The Pentagon Abingdon Science Park Abingdon, Oxfordshire OX14 3YP United Kingdom -Joachim Schneider
-Mike Morra
|
Version 5.60 |
Intel Core 2 Duo w/ Windows 7 Ultimate Edition 64-bit; Intel Core 2 Duo w/ Windows 7 Ultimate Edition 64-bit; Intel Core 2 Duo w/ Windows 7 Ultimate Edition 32-bit; Intel Pentium 4 w/ FreeBSD 6.1 | 8/12/2010 |
SHA-1     
(BYTE-only) "SafeGuard Cryptographic Engine is the core cryptographic component of Sophos'' Encryption products. It provides a solid implementation of standard algorithms used for disk and file encryption, key generation, key management, and integrity protection." |
1310 | Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 USA -Prateek Jain
|
Version 0.9.8l |
Dual Xeon QuadCore w/ Linux based on Red Hat Enterprise Version 5.1 | 8/12/2010 |
SHA-1     
(BYTE-only) "Accellion TLSv1 implementation uses SHS in the cipher suite for secure web communication." |
1309 | Hewlett-Packard Longdown Avenue Stoke Gifford, Bristol BS34 8QZ United Kingdom -Laura Loredo
|
Version 1.0 (Firmware) |
ARM966E | 8/12/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "SHA algorithms for TLS connection." |
1308 | Hewlett-Packard Longdown Avenue Stoke Gifford, Bristol BS34 8QZ United Kingdom -Laura Loredo
|
Version 1.0 (Firmware) |
ARM966E | 8/12/2010 |
SHA-256 
(BYTE-only) "A SHA implementation used in digitally signing firmware images." |
1307 | Cisco Systems, Inc. 170 W. Tasman Drive San Jose, CA 95134 USA -Sonu Shankar
|
Part # HD65246c1F19TPV |
N/A | 8/9/2010 |
SHA-1     
(BYTE-only) "The CTS hardware keystore provides a secure location for the storage of credentials and passwords utilizing smart card technology present in Cisco Catalyst and Nexus series switches." |
1306 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 ? Olympia, WA 98501 US -Patrick Townsend
-Shawn Protsman
|
Version 1.5.5 |
IBM POWER6 w/ IBM i V7R1 | 8/2/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Alliance AES Library is a software library providing AES encryption services." |
1305 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 ? Olympia, WA 98501 US -Patrick Townsend
-Shawn Protsman
|
Version 1.5.5 |
IBM POWER6 w/ IBM i V6R1 | 8/2/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Alliance AES Library is a software library providing AES encryption services." |
1304 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 ? Olympia, WA 98501 US -Patrick Townsend
-Shawn Protsman
|
Version 1.5.5 |
IBM POWER6 w/ IBM i V5R4 | 8/2/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Alliance AES Library is a software library providing AES encryption services." |
1303 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Michael Soto
|
Version 12.4(15)T10 and 12.4(15)T14 (Firmware) |
Freescale MPC 7448 processor | 8/2/2010 |
SHA-1     
(BYTE-only) "A Cisco 7206 VXR router equipped with an NPE-G2 provides integrated I/O functionality and can support up to six high-speed port adapters and can also support higher-speed port adapter interfaces including Gigabit Ethernet and OC-12 ATM." 07/08/11: Add new tested information; |
1302 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Zi8051-Secure Core | 8/2/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Z8H128D16CR Cryptographic Library, based on Nationz''s Z8H128D16CR SmartCard IC, is a single-chip firmware module that provides DES/TDES and RNG cryptographic services for government/corporate identification, payment, banking and Web applications, etc" |
1301 | CareFusion 3750 Torrey View Court San Diego, CA 92130 USA -Indresh Chaudhari
|
Version 9.7.0 |
Enea OSE 4.5.2 w/ Intel/Marvell PXA270 Family | 7/22/2010 |
SHA-256 
(BYTE-only) "Used in Alaris System PCU to protect patient data during exchange with external computer applications." 04/26/12: Update implementation information; |
1300 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Dedicated 32-bit secure RISC processor | 7/22/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Based on Nationz''s Z32H256 Security IC launched for high-end USB key and secure storage device market, the library features low power consumption and low cost, empowering greater capabilities with USB key, USB token with flash drive, desktop encryption machine, desktop VPN, etc." |
1299 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Low-Power 32-bit secure RISC processor | 7/22/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Z32D576C is a fully-featured security processor that provides algorithms such as DES, TDES, AES and RSA. The combination of high performance and low power consumption makes it a perfect choice for government/corporate security solutions, especially in mobile payment, banking, identification, network security, etc." |
1298 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Low-Power 32-bit secure RISC processor | 7/22/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Z32D576 is a fully-featured security processor that provides algorithms such as DES, TDES, AES and RSA. The combination of high performance and low power consumption makes it a perfect choice for government/corporate security solutions, especially in mobile payment, banking, identification, network security, etc." |
1297 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Zi8051-Secure Core | 7/22/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Z8L48D16C Cryptographic Library, based on Nationz''s Z8L48D16C SmartCard IC, is a single-chip firmware module that provides TDES and RNG cryptographic services for government/corporate identification, payment, Web applications, etc." |
1296 | Nationz Technologies Inc. 11-13F,Tower Building #3 China Academy of Science and Technology Dev. Gaoxin South Ave.1,Nanshan District Shenzhen, 518057 P. R. China -Yiwei Zhang
-Bo Peng
|
Version 1.0 (Firmware) |
Zi8051-Secure Core | 7/22/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Z8D16 is a single-chip firmware module that provides DES and RNG cryptographic services for mobile network secure lock and telecom operator identification." |
1295 | SanDisk Corporation 7 Atir Yeda St. Kfar Saba, 44425 Israel -Boris Dolgunov
|
Version 9.5.21.01 (Firmware) |
SecurCore SC100 ARM | 7/15/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The S3 crypto library Ver:9.5.21.01 was developed for the S3 FIPS cruser enterprise product. The crypto library includes HW and SW parts. The AES, CMAC and PRNG implemented using HW AES Dual Key Core accelerator. All the rest of algorithms are implemented in FW." |
1294 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 4.0 Build 208111 |
AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2003; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2003; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2003; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2003; AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2008; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2008; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2008; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2008; AMD Athlon™ w/ 64-bit Microsoft® Windows® 7; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows® 7; AMD Athlon™ w/ 32-bit Microsoft® Windows® Vista; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows® Vista; AMD Athlon™ w/ 64-bit Microsoft® Windows® Vista; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows® Vista; AMD Athlon™ w/ 32-bit Microsoft® Windows® 7; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows® 7; AMD Athlon™ w/ 64-bit Microsoft® Windows® XP; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows® XP; AMD Athlon™ w/ 32-bit Microsoft® Windows® XP; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows® XP | 7/15/2010 |
SHA-1     
(BYTE-only) "The VMware vSphere Client Cryptographic Engine provides the cryptographic services to VMware's vSphere Client application." 08/10/10: Update implementation information; |
1293 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 4.0 Build 208111 |
AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2003; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2003; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2003; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2003; AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2008; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2008; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2008; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2008; AMD Athlon™ w/ 32-bit Microsoft® Windows® XP; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows® XP | 7/15/2010 |
SHA-1     
(BYTE-only) "The VMware vCenter Cryptographic Engine provides the cryptographic services to VMware's vCenter Server product." 08/10/10: Update implementation information; |
1292 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version R02.00.00 (Firmware) Part # 51009397004 |
Motorola 51009397004 | 7/15/2010 |
SHA-384 
(BYTE-only) "The PIKE2 cryptographic processor is used in security modules embedded in Motorola security products. It is used to provide secure voice and data capabilities as well as APCO Over-the-Air-Rekeying and advanced key management." |
1291 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 4.0 Build 208111 |
AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2003 w/ JRE v1.5.0; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2003 w/ JRE v1.5.0; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2003 w/ JRE v1.5.0; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2003 w/ JRE v1.5.0; AMD Athlon™ w/ 32-bit Microsoft® Windows Server® 2008 w/ JRE v1.5.0; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows Server® 2008 w/ JRE v1.5.0; AMD Athlon™ w/ 64-bit Microsoft® Windows Server® 2008 w/ JRE v1.5.0; Intel® Pentium® 4 w/ 64-bit Microsoft® Windows Server® 2008 w/ JRE v1.5.0; AMD Athlon™ w/ 32-bit Microsoft® Windows® XP w/ JRE v1.5.0; Intel® Pentium® 4 w/ 32-bit Microsoft® Windows® XP w/ JRE v1.5.0 | 7/15/2010 |
SHA-1     
(BYTE-only) "The VMware vCenter Server Java Cryptographic Engine provides the cryptographic services to VMware's vCenter Server product." 08/10/10: Update implementation information; |
1290 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 4.0 Build 208167 |
Intel® Xeon® w/ 64-bit VMware ESXi; AMD Opteron™ w/ 64-bit VMware ESXi | 7/15/2010 |
SHA-1     
(BYTE-only) "The VMware ESXi Cryptographic Engine provides the cryptographic services to VMware's ESXi server product." 08/10/10: Update implementation information; |
1289 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA -Eric Betts
|
Version 4.0 Build 208167 |
AMD Opteron(TM) w/ 64-bit VMware ESX; Intel® Xeon® w/ 64-bit VMware ESX | 7/15/2010 |
SHA-1     
(BYTE-only) "The VMware ESX Cryptographic Engine provides the cryptographic services to VMware's ESX Server product." 08/10/10: Update implementation information; |
1288 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA -Rama Vissapragada
|
Version v1.0.5 |
Intel Core 2 Duo w/ Mac OS X x32; Intel Core 2 Duo w/ Mac OS X x64; Intel Core 2 Duo w/ Windows 7 x32; Intel Core 2 Duo w/ Windows 7 x64; Intel Core 2 Duo w/ Windows Vista x32; Intel Core 2 Duo w/ Windows XP x32; Intel Core 2 Duo w/ Windows XP x64; Intel Core 2 Duo w/ Windows Server 2008 x32; Intel Core 2 Duo w/ Windows Server 2008 x64 | 7/15/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Encryption Plus® Cryptographic Library ("EPCL") provides cryptographic services to the Symantec Corporation for Symantec, GuardianEdge, Encryption Anywhere, and Encryption Plus families of data protection products." 11/03/10: Update implementation information; |
1287 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA31595 Part # 5694-A01 |
IBM System z10™ Enterprise Class (z10 EC) w/ IBM z/OS® V1.11 | 7/15/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens." |
1286 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-Alyson Comer
|
Version OA31595 Part # 5694-A01 |
IBM System z10™ Enterprise Class (z10 EC) w/ IBM z/OS® V1.11 | 7/15/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based applcation programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens." |
1285 | RSA Security Inc. 228 South Street Hopkinton, MA 01748 USA -Jeff Stone
-Nirav Mehta
|
Version 1.3.1.1 |
AMD Athlon(TM) 64 X2 Dual w/ Microsoft Windows Server 2003 | 6/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "RSA BSAFE(R) Crypto Kernel provides core cryptographic functionality optimized for very small code size and speed to meet the needs of most constrained environments. It is the cryptographic foundation for RSA BSAFE(R) security products designed for C/C++ developers." |
1284 | Exar Corporation 48720 Kato Road Fremont, CA 94538 USA -Zack Mihalis
-Jeffrey Chan
|
Part # 820x-01 |
N/A | 6/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Exar 820x is an application services processor family designed for storage capacity optimization and network security. 820x accelerates algorithms such as LZS compression, AES encryption, SHA hash and PK operations for deduplication and security. It has a throughput up to 6Gbps doing compress, encrypt and hash in a single pass." |
1283 | Research in Motion 295 Philip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 6.0.0 (Firmware) |
Marvell Tavor PV | 6/30/2010 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Smartphones." |
1282 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version H1.0 (Firmware) Part # Inside Secure AT90SC generation U |
Inside Secure AT90SC generation U | 6/30/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "IDProtect is a CM based on the Athena OS755 Java Card 2.2.2 GlobalPlatform 2.1.1 smart card OS with 72KB EEPROM validated to FIPS 140-2 Level 3 supporting DRBG, TDES, AES, SHA-1 and -256, and RSA 2048 bits with on card keygen exposing PKI/biometric APIs designed for high-performance government/enterprise applications." 02/07/11: Update implementation information; |
1281 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Rob Williams
-Atsushi Yamada
|
Version 2.8 |
Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.5.0; Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.6.0; Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.5.0; Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.6.0; SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.5.0; SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.6.0; SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.5.0; SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.5.0; Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.5.0; Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.5.0; Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.6.0 | 6/30/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Java cryptographic toolkit." 10/12/10: Update vendor information; |
1280 | Adara Networks, Inc. 2150 N. First Street San Jose, CA 95131 USA -Lillian Withrow
|
Version 1.0 |
Intel Xeon E5440 w/ FreeBSD 8.0; Intel Xeon L5518 w/ FreeBSD 8.0 | 6/30/2010 |
SHA-1     
(BYTE-only) "Please see cover letter." |
1279 | Fortinet 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.2 (Firmware) |
AMD Opteron Dual Core; Intel Celeron; Intel Core 2 Duo; Intel Nehalem; Intel Pentium III; Intel Tolapai; Intel Xeon; Intel Xeon Quad Core | 6/30/2010 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v4.2 runs on an Intel x86 compatible processor using the FortiOS." |
1278 | Fortinet 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Part # CP-6 |
N/A | 6/30/2010 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-6" |
1277 | Cisco Systems, Inc. 170 W Tasman Drive San Jose, CA 95134 USA -n/a |
Part # CN1520-350BG256-G, v1.2 |
N/A | 6/24/2010 |
SHA-1     
(BYTE-only) "n/a" |
1276 | RSA Security Inc. 2831 Mission College Blvd. Santa Clara, CA 95054 USA -Kathy Kriese
|
Version 2.1.0.7 |
IBM PowerPC Power3 w/ Red Hat Enterprise Linux v5 (64-bit) | 6/24/2010 |
SHA-1     
(BYTE-only) SHA-224  (BIT) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE(R) Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
1275 | Fortinet 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Part # CP-4 |
N/A | 6/24/2010 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-4" |
1274 | Fortinet 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.2 (Firmware) |
AMD Opteron Dual Core; Intel Celeron; Intel Core 2 Duo; Intel Nehalem; Intel Pentium III; Intel Tolapai; Intel Xeon; Intel Xeon Quad Core; VIA Eden; AMD Geode | 6/24/2010 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v4.2 runs on an Intel x86 compatible processor using the FortiOS." 09/13/10: Add new tested OEs; |
1273 | Research in Motion 295 Philip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.6.5 (Firmware) |
Marvell Tavor PV | 6/24/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Smartphones." |
1272 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version R01.00.00 (Firmware) Part # 5175330H04 |
Motorola 5175330h04 | 6/24/2010 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) "The KVL 4000 PIKE provides security services for the KVL 4000. The KVL 4000 is a portable key distribution device that consists of a Personal Digital Assistant (PDA) and Security Adapter that connects to the PDA." |
1271 | Apple Inc. 11921 Freedom Drive Reston, VA 20190 USA -Shawn Geddis
|
Version 1.0 |
Intel Core 2 Duo w/ Mac OS X, v10.6.0 | 6/24/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Mac OS X''s security services are built using the open source Common Data Security Architecture. CDSA is a set of layered security services in which the AppleCSP provides the cryptography for services such as FileVault, Encrypted Disk Images, Keychains, Safari, Mail, etc.." |
1270 | N/A | N/A | N/A | 6/23/2010 | N/A |
1269 | Motorola Solutions, Inc. One Motorola Plaza Holtsville, NY 11742-1300 USA -Taheer Khazi
-Vamsi Modadugu
|
Version DAABES00-001-R00 |
Marvell XScale PXA320 w/ Windows Mobile 6.5 | 6/24/2010 |
SHA-1     
(BYTE-only) "The Motorola MC9500-K raises the bar for premier rugged mobile computing, incorporating breakthrough ergonomic design and features to support the most demanding field mobility applications. Truly in a class of its own, this groundbreaking device is as different on the inside as it is on the outside." |
1268 | Motorola Solutions, Inc. One Motorola Plaza Holtsville, NY 11742-1300 USA -Jay Greenrose
-Mariya Wright
|
Version DAABDS00-001-R00 (Firmware) |
Marvell XScale PXA320 | 6/24/2010 |
SHA-1     
(BYTE-only) "The DS6878 cordless imager from Motorola enables automated data capture, improves data accuracy, increase productivity and streamlines everyday processes. Captures 1D and 2D bar codes, signatures, documents such as drivers licenses and insurance cards, facial images for identification, video footage and more." |
1267 | Motorola Solutions, Inc. One Motorola Plaza Holtsville, NY 11742-1300 USA -Jay Greenrose
-Mariya Wright
|
Version DAABFS00-001-R00 |
Marvell XScale PXA270 w/ Windows CE 5.0 Core | 6/24/2010 |
SHA-1     
(BYTE-only) "The MT2000 Series combines the simplicity of a scanner with the intelligence of a mobile computer, provides advanced 1D/2D bar code, DPM and image capture, as well as the ability to key in and view data.802.11a/b/g, Bluetooth, corded and batch connectivity options provide the flexibility to meet a wide range of business needs." |
1266 | Motorola Solutions, Inc. One Motorola Plaza Holtsville, NY 11742-1300 USA -Jay Greenrose
-Mariya Wright
|
Version DAABGS00-001-R00 (Firmware) |
Renesas H8SX1668 RF | 6/24/2010 |
SHA-1     
(BYTE-only) "The MT2000 Series combines the simplicity of a scanner with the intelligence of a mobile computer, provides advanced 1D/2D bar code, DPM and image capture, as well as the ability to key in and view data. 802.11a/b/g, Bluetooth, corded and batch connectivity options provide the flexibility to meet a wide range of business needs." |
1265 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Jennifer Gilbert
|
Version 8.3.2 and 8.3.2.13(Firmware) |
Intel E7520; Intel Pentium 4; Intel Celeron; AMD Geode; | 6/24/2010 |
SHA-1     
(BYTE-only) "The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes." 10/07/10: Update implementation information; |
1264 | Good Technology 101 Redwood Shores Parkway Suite 401 Redwood City, CA 94065 USA |
Version 6.0.1 |
Intel Xeon E7450 w/ Windows Server 2003 | 6/17/2010 |
SHA-1     
(BYTE-only) "gdFIPSCrypto is a software-based algorithm implementation that supports Triple-DES, AES, SHA1, and HMAC-SHA1 for use on Windows Server 2003." |
1263 | N/A | N/A | N/A | 1/19/2011 | N/A |
1262 | Alvarion Ltd 21a Habarzel Tel Aviv, 69710 Israel -Adrian Iavorschi
|
Version 1.0 (Firmware) |
MPC8245 | 6/17/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "BreezeACCESS SEC, Alvarion''s broadband wireless platform in the 5.4 GHz and 4.9 GHz mainly for HLS (Home Land Security), Municipal and Governmental market segment." |
1261 | Verdasys, Inc. 404 Wyman Street Suite 320 Waltham, MA 02541 USA -Scott Shou
-Josh McCally
|
Version 1.0 |
Intel Core 2 Quad w/ Microsoft Windows XP (64-bit); Intel Core 2 Quad w/ Microsoft Windows XP (32-bit) | 6/10/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Previously called: Digital Guardian Security Kernel v1.0. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian." |
1260 | Quantum Corporation 1650 Technology Drive Suite 700 San Jose, CA 95110 US -Steve McKissick
|
Version 2.0.0 |
Intel Xeon w/ rPath linux 2.6.29 64-bit | 6/10/2010 |
SHA-1     
(BYTE-only) Implementation does not support zero-length (null) messages. "Scalar OpenSSL FIPS Library is a software library based on an unmodified version of FIPS compliant OpenSSL." |
1259 | Palo Alto Networks 232 E. Java Dr. Sunnyvale, CA 94089 USA -Nick Campagna
|
Version 0.9.8l-24 (Firmware) |
Intel Dual Core Xeon; Cavium Octeon | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Delivered as a purpose-built platform, Palo Alto Networks next-generation firewalls bring visibility and control over applications, users and content back to the IT department using three identification technologies: App-ID, User-ID and Content-ID." |
1258 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 Olympia, WA 98501 US -Patrick Townsend
|
Version 2.0.0 |
Intel CORE 2 DUO w/ rPath Linux 2.6.29 64-bit | 6/3/2010 |
SHA-1     
(BYTE-only) Does not support zero-length (null) messages. "Alliance OpenSSL FIPS Library is a software library based on an unmodified version of FIPS compliant OpenSSL." |
1257 | Communication Devices Inc. 85 Fulton St. Boonton, NJ 07005-1912 USA -Donald Snook
|
Part # 01-03-0912 |
N/A | 6/3/2010 |
SHA-1     
(BYTE-only) "The PA100 is designed to provide Secure Encrypted Out of Band Management access to network appliances such as firewalls, routers, network switches etc." |
1256 | Wind River Systems, Inc. 500 Wind River Way Alameda, CA 94501 USA -Janet Davis
|
Version 3.12.4 |
x86_64 Nehalem Xeon 5500 w/ Wind River Linux Secure 1.0; ppc_32 mpc8572 w/ Wind River Linux Secure 1.0; x86_64 Pentium core2 duo w/ Wind River Linux Secure 1.0; ARM TI OMAP3530 w/ Wind River Linux Secure 1.0 | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Wind River Linux Secure uses Network Security Services (NSS) to provide a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with WRLS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards." |
1255 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.0R3 (Firmware) |
Cavium Octeon | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways IPSec provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers" Does not support NULL message |
1254 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.0R4 (Firmware) |
Cavium Octeon | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router IPSec designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." Does not support NULL messages |
1253 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.2 (Firmware) |
Intel Xeon; Intel Pentium | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The firmware implementation of the Fortinet FortiAnalyzer FIPS Cryptographic Library v4.2 runs on an Intel x86 compatible processor using the FortiAnalyzer OS." |
1252 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.2 (Firmware) |
Intel Xeon; Intel Pentium; VIA Eden; AMD Geode | 6/3/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The firmware implementation of the Fortinet FortiAnalyzer SSL Cryptographic Library v4.2 runs on an Intel x86 compatible processor using the FortiAnalyzer OS." 09/13/10: Add new tested OEs; |
1251 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 USA -David Ambrose
|
Version NGX R66.1 with hotfix 1 (Firmware) |
Intel® Core(TM)2 Duo | 6/3/2010 |
SHA-1     
(BYTE-only) "Check Point Connectra that unifies SSL VPN, IPSec VPN, and integrated intrusion prevention for secure connectivity for mobile and remote workers while protecting enterprise networks and endpoints from external threats. Connectra includes centralized management and DynamicID SMS authentication." |
1250 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 3.11.4 |
AMD Opteron w/ Red Hat Enterprise Linux 5.4; Intel Itanium2 w/ Red Hat Enterprise Linux 5.4 | 5/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library provided by the Mozilla Foundation for general purpose cryptographic usage. The testing covers the cipher implementations found in the softtoken component of the NSS library." |
1249 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.3.1 |
Intel Xeon w/ Red Hat Enterprise Linux Version 5.1; Intel Pentium 4 w/ Microsoft Windows XP Professional SP2; Intel Pentium 4 w/ Microsoft Windows Server 2003 SP2. | 5/27/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A software cryptographic module supporting encryption, authentication, and data redundancy techniques running on either Linux user or Windows kernel mode." |
1248 | Adara Networks, Inc. 2150 N. First Street San Jose, CA 95131 USA -Lillian Withrow
|
Version 1.0 |
Intel Xeon w/ FreeBSD 8.0 | 5/27/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Adara Networks product is an open standards and open architecture based full stack router that provides high performance multipath routing capabilities, end to end QOS, data interoperability, virtualization web services, federation of databases and a secure cloud computing platform for inter-enterprise collaborations." |
1247 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -David Gerendas
|
Version 5.2.5 |
3.0 GHz Intel Pentium D Processor 830 (1 CPU) 32 bit w/ Microsoft Windows Server 2003 Standard v5.2 SP2; 1.7 GHz quad core AMD Opteron 2344 Processor (2 CPUs), 64-bit w/ Microsoft Windows Server 2008 Enterprise Edition 64 bit; 3.0 GHz Intel Core 2 Duo E8400, 64-bit w/ Windows Vista Enterprise Edition 64 bit; 3.0 GHz Intel Pentium D Processor 830 (1 CPU), 32 bit w/ Microsoft Windows XP Professional v5.1 SP2 | 5/27/2010 |
SHA-1     
(BYTE-only) "This Cryptographic algorithm module provides cryptographic functionality for McAfee''s Endpoint Encryption product range." 05/19/11: Update implementation information; |
1246 | Hewlett–Packard Development Company, L.P. 3000 Hanover Street Palo Alto, CA 94304-1185 USA -Mihai Damian
-Vijay Immanuel
|
Version 1.0 |
Intel Xeon w/ Debian Linux HPTE Version 4.0.0; AMD Opteron w/ Debian Linux HPTE Version 3.0.0 | 5/12/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The NSVLE Client Library provides functions supporting key generation, secure key retrieval, and secure communications with an HP Enterprise Secure Key Manager appliance." |
1245 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 5.0 (Firmware) |
Intel® Pentium Dual-Core | 5/12/2010 |
SHA-1     
(BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
1244 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 5.0 (Firmware) |
Intel® Pentium Dual-Core | 5/12/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data." |
1243 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Arnaud Lotigier
|
Version #11-M1005011+Softmask V02 (Firmware) Part # A1023378 |
Infineon SLE66CLX1280PE w/ TOP DL V2 smart Card | 5/12/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This module is based on a Java Card platform (TOP DL V2) with 128K EEPROM memory available. The Cryptographic Module provides dual interfaces (i.e. contact and contact-less) where the same security level is achieved." |
1242 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.0R3 (Firmware) |
Cavium Octeon | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers" |
1241 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(23c)JA (Firmware) |
AMCC 460EXr | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL messages |
1240 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Part # AMCC 460EXr |
N/A | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1239 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Part # Freescale MPC8349E |
N/A | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1238 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(23c)JA (Firmware) |
Freescale MPC8349E | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1237 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Part # AMCC 405EX |
N/A | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1236 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(23c)JA (Firmware) |
AMCC 405EX | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1235 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(23c)JA (Firmware) |
IBM PPC405EP | 5/10/2010 |
SHA-1     
(BYTE-only) "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." Does not support NULL message |
1234 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Huntley
|
Version 10.0R4 (Firmware) |
Cavium Octeon | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Juniper Networks LN1000-V Mobile Secure Router designed specifically for the Internet. A full suite of industrial-strength routing protocols, a flexible policy language, and a leading MPLS implementation efficiently scale to large numbers of network interfaces and routes." |
1233 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Marcus Streets
-James Huang
|
Version 0.9.8l (Firmware) |
Intel Xeon Dual Core | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "An implementation of the OpenSSL 0.9.8l library used in the Thales Encryption Manager for Storage" |
1232 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Marcus Streets
-James Huang
|
Version 3.12.4 (Firmware) |
Intel Xeon Dual Core | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "An implementation of the NSS (Network Security Services) library used in the Thales Encryption Manager for Storage." |
1231 | Thales e-Security Inc. 2200 North Commerce Parkway Suite 200 Weston, Florida 33326 USA -Marcus Streets
-James Huang
|
Version NSS 3.12.4 (Firmware) |
Intel Xeon Dual Core | 5/10/2010 |
SHA-256 
(BYTE-only) "An implementation of the SP800-90 random bit generator used to provide cryptographically secure random numbers for all libraries in the TEMS appliance." |
1230 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version FP-CRYPTO-7.0.0 (Firmware) Part # P/N CN56XX |
Cavium CN56XX | 5/10/2010 |
SHA-1     
(BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." |
1229 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version OPENSSL-0.9.8g-7.0.0 (Firmware) |
Cavium CN56XX | 5/10/2010 |
SHA-1     
(BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." |
1228 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version QUICKSEC-2.0-7.0.0 (Firmware) |
Cavium CN56XX | 5/10/2010 |
SHA-1     
(BYTE-only) "Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." |
1227 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version OPENSSL-0.9.8g-7.0.0 (Firmware) |
Motorola MPC8540 PowerQUICC III | 5/10/2010 |
SHA-1     
(BYTE-only) "Cisco WLAN Controllers provide centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." |
1226 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version QUICKSEC-2.0-7.0.0 (Firmware) |
Motorola MPC8540 PowerQUICC III | 5/10/2010 |
SHA-1     
(BYTE-only) "Cisco WLAN Controllers provide centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture." |
1225 | Seagate Technology LLC. 389 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Version 3.0 (Firmware) |
ARM Cortex-R Family | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "FW implementation of Secure Hash Algorithms in Seagate''s self encryption disk drives (SEDs)." 02/28/14: Updated implementation information; |
1224 | Seagate Technology LLC. 389 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Version 3.0 (Firmware) |
ARMv6 | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "FW implementation of Secure Hash Algorithms in Seagate''s self encryption disk drives (SEDs)." |
1223 | Seagate Technology LLC. 389 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Version 3.0 (Firmware) |
ARMv5 | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "FW implementation of Secure Hash Algorithms in Seagate''s self encryption disk drives (SEDs)." |
1222 | Hangzhou Synochip Technologies Co.,Ltd. 2F, Building 17, No. 176 Tianmushan Road Hangzhou, Zhejiang 310012 China -Windy Ye
-Howard He
|
Version 1.0 |
Cordis 5+ is a core with best-in-class speed, die area and power characteristics. w/ Fingerprint processing accelerator, algorithm firmware | 5/10/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "1) Security Applications,such as Digital Certification, USB Keys,2) Fingerprint Identification, 3)Embedded Applications" |
1221 | N/A | N/A | N/A | 4/28/2010 | N/A |
1220 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 2.1 (Firmware) |
Bluefly Processor | 4/26/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." 04/23/12: Updated vendor information; |
1219 | STMicroelectronics 4690 Executive Drive, Suite 200 San Diego, CA 92130 USA -Arnaud Pate-Cazal
-Rahul Seth
|
Part # ST-HCSL3-PC-SHA Version 2.0 |
N/A | 4/26/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The STM HardCache™ SL3/PC is a secure ASIC used for Access Control and Data Storage Encryption in PC application. It integrates a dedicated RISC processor coupled with a HW accelerated Cryptographic Engine." |
1218 | IBM Corporation 2455 South Road Poughkeepsie, New York 12601-5400 USA -William Penny
-James Sweeny
|
Version OA32012 Part # 5694-A01 |
IBM System z10™ Enterprise Class (z10 EC) w/ IBM z/OS® V1.11 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services." |
1217 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM PowerPC 5 64-bit w/ IBM AIX 6.1 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1216 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Microsoft Windows Servers 2008 32-bit | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1215 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Microsoft Windows Server 2008 64-bit | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1214 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
Sun UltraSPARC T1000 64-bit w/ Sun Solaris 10 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1213 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
Sun UltraSPARC T1000 64-bit w/ Sun Solaris 10 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1212 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM PowerPC 5 64-bit w/ IBM AIX 6.1 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1211 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM zSeries z10 64-bit w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BIT) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1210 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM zSeries z10 64-bit w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1209 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1208 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1207 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library used by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1206 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1205 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5 | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library that uses the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1204 | IBM Corporation IBM/Tivoli P.O. Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Alex Hennekam
|
Version 8.0.0 |
AMD Opteron X86_64 w/ Microsoft Windows Server 2008 32-bit | 4/21/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." |
1203 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 9.10 |
Dell PowerEdge 860 with Dual Core Xeon 3060 processor ,1 GB RAM, DVD-ROM, 80 GB SATA hard disk drive w/ Windows XP Professional 2002 SP-2 | 1/26/2010 |
SHA-1     
(BYTE-only) "PGP Bootguard is a component of PGP Whole Disk Encryption which locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swapfiles." |
1202 | G4S Technology Limited Challenge House, International Drive Tewkesbury, Gloucestershire GL20 8UQ United Kingdom -Steve Amos
-Kevin Hollingworth
|
Version 1.2.0.0 |
Intel Core 2 Duo w/ Microsoft Windows XP Professional SP3 (x86); Intel Core 2 Duo w/ Microsoft Windows Vista SP2 (x86); Intel Core 2 Duo w/ Microsoft Windows 7 (x86); Intel Quad Core Xeon w/ Microsoft Windows Server 2003 SP2 (x86); Intel Quad Core Xeon w/ Microsoft Windows Server 2008 SP2 (x86) | 4/13/2010 |
SHA-1     
(BYTE-only) "The Symmetry Cryptographic Module provides AES 256 bit encryption functionality to enable a client application to provide a secure channel for transmission of data across a network." |
1201 | Apani Networks 1800 E. Imperial Highway Suite 210 Brea, CA 92821 USA -Russell Glenn
-Cory Stockhoff
|
Version V1.0.0 and V1.0.1 |
Intel® Core(TM)2 Duo w/ Microsoft Windows Server 2003 (32-bit); Intel® Core(TM)2 Duo w/ Microsoft Windows Server 2008 (32-bit); Intel® Core(TM)2 Duo w/ Microsoft Windows XP (32-bit); Intel® Core(TM)2 Duo w/ Microsoft Windows Server 2003 (64-bit); Intel® Core(TM)2 Duo w/ Microsoft Windows Server 2008 (64-bit); Intel® Core(TM)2 Duo w/ Microsoft Windows XP (64-bit) | 4/9/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Apani EpiForce creates an identity-aware network that protects network communications by isolating users, servers, clients and sensitive data into security zones. EpiForce central management delivers the flexibility and efficiency not available with traditional network security solutions." 09/23/10: Update implementation information; |
1200 | SAMSUNG ELECTRONICS CO., LTD. 416, Maetan-3Dong, Paldal-Gu Suwon, Kyungki-Do 443 742 South Korea -Wable R. U.
|
Version 1.0 |
ARM 1176JZF-S w/ Nucleus; ARM Cortex A8 w/ Nucleus | 4/9/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The cryptographic library APIs is software implementation of the cryptographic algorithms. These APIs provide advanced cryptographic functionality to Samsung mobile handsets." |
1199 | AirTight® Networks 339 N. Bernardo Avenue Suite 200 Mountain View, CA 94043 USA -Sri Sundaralingam
|
Version 6.2.36 (Firmware) |
AR7161 from Atheros Communications | 4/9/2010 |
SHA-1     
(BYTE-only) "The implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks." |
1198 | Secure64 Software Corporation 5600 South Quebec Street Suite 320D Greenwood Village, CO 80111 USA |
Version 1.3 (Firmware) |
Intel Itanium | 4/9/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Secure64 Cryptographic Module" |
1197 | Cloakware, Inc. 8219 Leesburg Pike Suite 350 Vienna, Virginia 22182-2656 USA -Trevor Brown
-Garney Adams
|
Version 1.0 |
Intel Pentium 4 w/ Red Hat Enterprise Linux AS 5.0; SPARC v9 w/ Sun Solaris 10; Intel Core2 Quad w/ Microsoft Windows Server 2008 | 3/31/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cloakware Password Authority is a highly-scalable priviledged password management solution. CPA automates the management of application-to-application and administrator credentials across an enterprise by storing passwords and IDs in an AES-encrypted database." |
1196 | Hewlett Packard®, Enterprise 10810 Farnam Drive NBN02 Omaha, NE 68154 USA -Peter Martin
|
Version E10.21 |
Itanium Dual core 9100 series (Bl860C HP name) w/ Non Stop OS J06.08 | 3/31/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "OpenCall HLR Software Module" |
1195 | AccessData Corp 384 South 400 West Lindon, UT 84042 USA -Jeff Looman
|
Version 1.0 |
Intel Pentium w/ Windows XP SP3 | 3/31/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AccessData Secure Communications FIPS 140-2 Object Module is a software library between the validated OpenSSL FIPS Object Module version 1.1.2 and a host application. The module provides to any AccessData application that incorporates it, electronic encryption designed to prevent unauthorized access to data transferred across a network." |
1194 | Hewlett-Packard Company
Hewlett-Packard Company 19091 Pruneridge Ave. MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.0 (Firmware) |
PowerPC 440EPx | 3/30/2010 |
SHA-256 
(BYTE-only) "The Atalla Cryptographic Subsystem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing. The ACS features secure key management and storage capabilities, and also provides high performance AES processing." 08/29/11: Update vendor information; |
1193 | Icom Inc. 1-1-32 Kamiminami Hirano-ku Osaka, Osaka 547-0003 Japan -Masaaki Takahashi
|
Version 1.0 (Firmware) |
Texas Instruments TMS320 | 3/30/2010 |
SHA-1     
(BYTE-only) "Cryptographic Module" |
1192 | Elliptic Technologies 62 Steacie Drive Suite 201 Ottawa, Ontario K2K 2A9 Canada -Patrick Offers
-Russ Baker
|
Version 3.2 |
AMD Phenom 9500 Quad-Core (64 bit) w/ Ubuntu Linux with kernel 2.6.31; Intel Pentium 4 (32 bit) w/ Red Hat Linux with kernel 2.6.31; ARM9 w/ Linux kernel 2.6.12 | 3/17/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Ellipsys security middleware targets embedded designs using Linux, Android, VxWorks, etc. It supports public key encryption, certificates, symmetric ciphers, hash, and authentication with a comprehensive API. It is compact and supports software only designs and hardware offload making it ideally suited for embedded applications." |
1191 | Rajant Corporation 400 East King Street Malvern, PA 19355 USA -Marty Lamb
|
Version 10.13 (Firmware) |
Intel IXP435 Network Processor | 3/17/2010 |
SHA-1     
(BYTE-only) "The Rajant BreadCrumb ME3-24 is a rugged wireless transmitter-receiver that forms a highly mobile mesh network (using InstaMesh) when used in conjunction with other BreadCrumb devices. This portable wireless mesh network node supports an open-standard IEE 802.11 b/g radio to enable data, voice and video applications." |
1190 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada -Laurie Smith
-Yousof Pakzad
|
Version 4.8.1 (Firmware) |
StrongARM II 80219 | 3/10/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1189 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -David Gerendas
-David Reese
|
Version 1.0 |
Intel® Pentium® 4 w/ Microsoft Windows XP (32-bit); Intel® Core(TM)2 Quad w/ Microsoft Windows XP (64-bit); Intel® Pentium® 4 w/ Microsoft Windows Vista (32-bit); Intel® Core(TM)2 Quad w/ Microsoft Windows Vista (64-bit); Intel® Pentium® 4 w/ Microsoft Windows Server 2008 (32-bit); Intel® Core(TM)2 Quad w/ Microsoft Windows Server 2008 (64-bit); Intel® Pentium® 4 w/ Intel® Pentium® 4; Intel® Core(TM)2 Quad w/ Microsoft Windows Server 2003 (64-bit); Intel® Pentium® 4 w/ Microsoft Windows 2000 Server; Intel® Pentium® 4 w/ Microsoft Windows 2000 Workstation | 3/10/2010 |
SHA-1     
(BYTE-only) "The McAfee Application Control/Change Control Cryptographic Engine v1.0 provides the cryptographic services necessary to support McAfee''s line of risk and compliance solutions, including the Application Control and Change Control products." 03/16/10: Update vendor PO information; |
1188 | IBM 2455 South Road Poughkeepsie, NY 12601-5400 USA -Tamas Visegrady
|
Version 2.0 (Firmware) Part # 45D6049 |
PPC405GPr | 3/10/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "The IBM PCI-e Cryptographic Coprocessor Security Module is a failure-resilient, tamper-protected, programmable PCI Express module with processors, hardware random number generation, and cryptographic engines within a tamper-responding enclosure" |
1187 | Unisys Corporation 2470 Highcrest Road Roseville, MN 55113 USA -James Heit
-Mary Ann Bucher
|
Version 1R1 |
Unisys 2200 (36-bit) w/ OS 2200 Integrated Operating Environment 13.0 | 3/10/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "General purpose cryptographic software library." |
1186 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version 2.0 (Firmware) |
Bluefly Processor | 3/10/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." 04/23/12: Updated vendor information; |
1185 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Iain Holness
|
Version 4.9 (Firmware) |
Intel Xeon; VIA C7 | 2/16/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet Inc. DataSecure Appliance is a dedicated hardware product that is designed specifically for security management and cryptographic processing." |
1184 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 4.0 |
Dell Power Edge 860 Dual Core Xeon 3060 processor, 1 GB RAM, DVD-ROM, 80 GB SATA hard drive disk. w/ Linux, 32-bit: CentOS 5.3 | 2/16/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." |
1183 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 4.0 |
Apple MacBook Pro w/ Mac OS X 10.6 | 2/16/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." |
1182 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 4.0 |
Dell PowerEdge 860 Dual Core Xeon 3060 processor, 1 GB RAM, DVD_ROM, 80 GB SATA hard disk drive. w/ Windows XP Professional 2002 SP-2 | 2/16/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." |
1181 | Toshiba Corporation 1-1, Shibaura 1-chome Minato-ku, Tokyo 105-8001 Japan -Yichang Chan
|
Version 1.16 (Firmware) |
Toshiba SoC | 2/16/2010 |
SHA-256 
(BYTE-only) "Toshiba Secure Cryptographic Suite (TSCS) is a library of unique hardware and software cipher solutions which are standard encryption algorithm-based to provide Toshiba products and the systems using them a robust and secure data storage environment." |
1180 | GDC Technology (USA), LLC 3500 W. Olive Ave., Suite 940 Burbank, CA 91505 USA -Arun Kishore
|
Version 1.0 (Firmware) |
Xilinx PowerPC | 2/16/2010 |
SHA-1     
(BYTE-only) "A PowerPC implementation of the SHA-1 algorithm." |
1179 | GDC Technology (USA), LLC 3500 W. Olive Ave., Suite 940 Burbank, CA 91505 USA -Arun Kishore
|
Version 1.0 (Firmware) |
Dallas DS5250 | 2/16/2010 |
SHA-1     
(BYTE-only) "A DS5250 implementation of the SHA-1 algorithm." |
1178 | GDC Technology (USA), LLC 3500 W. Olive Ave., Suite 940 Burbank, CA 91505 USA -Arun Kishore
|
Version 1.0 (Firmware) |
Xilinx FPGA | 2/16/2010 |
SHA-1     
(BYTE-only) "An FPGA implementation of the SHA-1 algorithm." |
1177 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version 5.01.01 (Firmware) Part # MAXQ1959B-F50# |
Maxim MAXQ1959 | 2/16/2010 |
SHA-1     
(BYTE-only) SHA Implementation supports messages less than or equal to 4096-bits "The Pitney Bowes iButton Postal Security Device (PSD) complies with FIPS 140-2 standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
1176 | GDC Technology (USA), LLC 3500 W. Olive Ave., Suite 940 Burbank, CA 91505 USA -Arun Kishore
|
Version 1.0 |
IBM Power PC 405 w/ Linux 2.6 | 2/2/2010 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A cryptographic module used by GDC digital cinema solutions." |
1175 | eIQNetworks, Inc. 31 Nagog Park Acton, MA 01720 USA -n/a |
Version 1.2 |
Intel Xeon w/ Window Server 2003 R2 SP2; Intel Xeon w/ Windows Server 2003 SP2; Intel Core 2 Duo w/ Windows XP Pro SP2 (x64) | 2/2/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SecureVue module are EXEs which use wrappers around FIPS compliant OPENSSL code to provide cryptographic capabilities. Encryption, Decryption, Key Generation and Key Exchange/Communication are all done using OPENSSL code." 03/01/10: Update the implementation information; |
1174 | VMware, Inc. 3401 Hillview Avenue Palo Alto, CA 94304 USA -Eric Betts
|
Version 1.0 |
Intel x86 w/ Microsoft Windows XP Professional SP2; AMD x86 w/ Microsoft Windows XP Professional SP2; Intel x86 w/ Microsoft Windows Vista; AMD x86 w/ Microsoft Windows Vista; Intel® Xeon® w/ VMware ESX(TM)i; Intel® Core(TM)2 Processor with Viiv(TM) Technology w/ VMware ESX(TM)i; AMD Opteron(TM) w/ VMware ESX(TM)i; AMD Athlon(TM) X2 Dual-Core 64-bit w/ VMware ESX(TM)i; Intel® Xeon® w/ VMware ESX(TM); Intel® Core(TM)2 Processor with Viiv(TM) Technology w/ VMware ESX(TM); AMD Opteron(TM) w/ VMware ESX(TM); AMD Athlon(TM) X2 Dual-Core 64-bit w/ AMD Athlon(TM) X2 Dual-Core 64-bit; Intel x86 w/ Microsoft Windows Server 2003 SP1; AMD x86 w/ Microsoft Windows Server 2003 SP1;Intel x86 w/ Microsoft Windows Server 2000 SP4; AMD x86 w/ Microsoft Windows Server 2000 SP4 | 2/2/2010 |
SHA-1     
(BYTE-only) "The VMware Cryptographic Engine provides the encryption and hashing services to VMware''s family of virtualization solutions, including ESX, ESXi, and VirtualCenter Server which together provide datacenter virtualization and centralized management." |
1173 | IBM Corporation 9032 S Rita Road Tucson, AZ 85744 USA -David L. Swanson
-Christine Knibloe
|
Version 1.0 (Firmware) |
Renesas SH7780 | 2/2/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Firmware cryptographic implementation that adds secure key channel capabilities to the IBM TS1130" |
1172 | Schweitzer Engineering Laboratories, Inc. 2350 NE Hopkins Court Pullman, WA 99163 USA -Joe Casebolt
|
Version 1.0 (Firmware) |
Freescale i.MX31 with Xilinx Spartan 3 | 2/2/2010 |
SHA-256 
(BYTE-only) "The SEL Cryptographic Daughter Card provides strong cryptographic security to a variety of communications networks. It protects point-to-point, multi-drop, and many-to-many networks. The card secures all byte oriented serial protocols including popular SCADA or PCS protocols like DNP and MODBUS common to PLC, IED, and RTU products. It quickly integrates into serial communication networks including modem and data radio." |
1171 | Schweitzer Engineering Laboratories, Inc. 2350 NE Hopkins Court Pullman, WA 99163 USA -Joe Casebolt
|
Version 1.0 (Firmware) |
Freescale i.MX31 with Xilinx Spartan 3 | 2/2/2010 |
SHA-1     
(BYTE-only) "The SEL Cryptographic Daughter Card provides strong cryptographic security to a variety of communications networks. It protects point-to-point, multi-drop, and many-to-many networks. The card secures all byte oriented serial protocols including popular SCADA or PCS protocols like DNP and MODBUS common to PLC, IED, and RTU products. It quickly integrates into serial communication networks including modem and data radio." |
1170 | Schweitzer Engineering Laboratories, Inc. 2350 NE Hopkins Court Pullman, WA 99163 USA -Joe Casebolt
|
Version 1.0 (Firmware) |
Freescale i.MX31 with Xilinx Spartan 3 | 2/2/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SEL Cryptographic Daughter Card provides strong cryptographic security to a variety of communications networks. It protects point-to-point, multi-drop, and many-to-many networks. The card secures all byte oriented serial protocols including popular SCADA or PCS protocols like DNP and MODBUS common to PLC, IED, and RTU products. It quickly integrates into serial communication networks including modem and data radio." |
1169 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France -Arnaud Lotigier
|
Version Build#11 - M1005011 (Firmware) Part # A1023378 |
Infineon SLE66CLX1280PE w/ TOP DL V2 smart Card | 1/19/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This module is based on a Java Card platform (TOP DL V2) with 128K EEPROM memory available. The Cryptographic Module provides dual interfaces (i.e. contact and contact-less) where the same security level is achieved." |
1168 | Teledyne Webb Research 82 Technology Park Drive Falmouth, MA 02536-4441 USA -David Pingal
|
Version 1.1 |
MC68338 processor w/ PicoDOS | 1/19/2010 |
SHA-256 
(BYTE-only) "MiniCrypt is a general purpose firmware cryptographic module, to provide symmetric encryption, hashing, and message authentication code creation for resource constrained embedded systems." 12/16/10: Update implementation information; |
1167 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Ezer Farhi
|
Version 4.7 (Firmware) |
Intel® Pentium Dual-Core | 1/7/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host." 05/12/10: Redefined as firmware implementation. |
1166 | Cavium Networks 805 E Middlefield Road Mountain View, CA 94109 USA -TA Ramanujam
|
Version 1.0 (Firmware) |
Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX Security Processor | 1/7/2010 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) Implementation does not support zero-length (null) messages. "NITROX XL CN16XX-NFBE HSM (Hardware Security Module) Adapter family." |
1165 | Cavium Networks 805 E Middlefield Road Mountain View, CA 94109 USA -TA Ramanujam
|
Version 1.0 (Firmware) |
Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX Security Processor | 1/7/2010 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NITROX XL CN16XX-NFBE HSM (Hardware Security Module) Adapter family." |
1164 | Egis Technology Inc. 7F., No. 257, Sec. 2, Tiding Blvd. Neihu District Taipei, Taiwan 114 R.O.C. -Edward Chen
-Richard Chang
|
Version 1.0 |
Intel Core 2 Duo w/ Windows XP, Windows Vista, Windows 7 | 1/7/2010 |
SHA-1     
(BIT) SHA-224  (BIT) SHA-256  (BIT) SHA-384  (BIT) SHA-512  (BIT) Bit Only "EgisTec Cryptographic Library implements the cryptographic functionalities for EgisTec encryption applications. EgisTec provides fingerprint solution including HW/SW/FW and relevant security functions for PC, NB, mass storage device as well as standalone application devices." |
1163 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074004F, vSPYCOS 3.0 F |
N/A | 12/30/2009 |
SHA-1     
(BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1162 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074003F, vSPYCOS 2.4 F |
N/A | 12/30/2009 |
SHA-1     
(BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1161 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074002F, vSPYCOS 2.4 F |
N/A | 12/30/2009 |
SHA-1     
(BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1160 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074004F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1159 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074003F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1158 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074002F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1157 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074004F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1156 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074003F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1155 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074002F, v03.00.0C |
N/A | 12/30/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
1154 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Part # 294.007 |
N/A | 12/30/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The IronKey Secure Flash Drive includes a high-speed hardware-based 256 Bit AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, SHA-256, SHA-1, and RNG algorithms." 10/19/11: Update vendor information; |
1153 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Chris Romeo
|
Version 8.0.5, 8.2.1 and 8.2.2.9 (Firmware) |
Intel Celeron; Intel Pentium 4; AMD Geode | 12/23/2009 |
SHA-1     
(BYTE-only) "The market-leading Cisco PIX and ASA security appliances deliver robust user and application policy enforcement and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco PIX and ASA security appliances provide comprehensive security, performance, and reliability for network environments of all sizes." 02/04/10: Add new tested version; 04/13/10: added new tested version |
1152 | AEP Networks Ltd. Focus 31, West Wing Cleveland Road Hemel Hempstead, Herts HP2 7BW United Kingdom -David Miller
-Rod Saunders
|
Version 010837 v2 rel 8 (Firmware) |
Motorola PowerPC 866 | 12/23/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AEP Networks Advanced Configurable Crypto Environment (ACCE) provides highly secure cryptographic services and key storage. It is the "computer" used in a range of AEP Networks and OEM products including the Keyper Model 9720 family." |
1151 | Quantum Corporation 1650 Technology Drive Suite 700 San Jose, CA 95110 US -Steve McKissick
|
Version 2.0.3 |
Intel Xeon w/ rPath linux 2.6.29 64-bit | 12/23/2009 |
SHA-256 
(BYTE-only) "Scalar Hash Library is a software library providing SHA hash and HMAC services." 01/12/10: Update OES; |
1150 | SyferLock Technology Corporation 250 Pequot Avenue Southport, Connecticut 06890 United States -Eben Stewart
-Kimberly O'Leary
|
Version 1.0 |
Intel Core 2 Duo w/ Linux CentOS 5.2 w/ Sun JRE 1.5.0 | 12/23/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The GridCore Cryptographic Library provides cryptographic routines to the suite of SyferLock authentication and security solutions." 01/15/10: Update implementation info; |
1149 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 4.0 |
Dell PowerEdge 860 Dual Core Xeon 3060 processor, 1 GB RAM, DVD_ROM, 80 GB SATA hard disk drive w/ Windows XP Professional SP2 (Kernel Mode) | 12/23/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Engine includes a wide range of field-tested and standards-based encryption, and encoding algorithms used in disk encryption." 05/05/10:Modified OE |
1148 | Doremi Labs 1020 Chestnut Street Burbank, CA 91506 USA -Jean-Philippe Viollet
-Camille Rizko
|
Version 1.1 (Firmware) |
Power PC | 12/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "An implementation of SHA-1 and SHA-256 algorithms used inside Doremi''s Media Blocks" |
1147 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Laura Stubbs
|
Version 2.4.2t (Firmware) |
Intel Xeon; Freescale Semiconductor Power QUICC | 12/10/2009 |
SHA-1     
(BYTE-only) "IOS XE Firmware containing the firmware implementations of many of the algorithms used by the Cisco ASR routers." |
1146 | VT iDirect, Inc. 13865 Sunrise Valley Drive Herndon, VA 20171 USA -Gregory Quiggle
|
Version 8.3.12.1 |
EWIXP465BAET w/ Linux 2.6.17.8; Intel PRIXP425ABD w/ Linux 2.4.24; Intel PRIXP420BD w/ Linux 2.4.24; Intel PRIXP420ABD w/ Linux 2.4.24; Intel EWIXP425ABDT w/ Linux 2.4.24 | 12/10/2009 |
SHA-1     
(BYTE-only) "iDirect’s AES-based bidirectional link encryption, combined with other system features such as cutting-edge coding techniques, acceleration and compression provides a fully integrated IP networking solution where security, performance and bandwidth efficiency are critical." |
1145 | 3e Technologies International, Inc. 9715 Key West Avenue Rockville, MD 20850 USA -Ryon Coleman
-Chaoxing Lin
|
Version 0.9.7-beta3 (Firmware) |
Intel XScale | 12/10/2009 |
SHA-1     
(BYTE-only) "Algorithms listed are used to provide encryption and authentication services within 3eTI networking products." |
1144 | Patrick Townsend Security Solutions 406 Legion Way SE Suite 300 Olympia, WA 98501 US -Patrick Townsend
|
Version 2.0.3 |
Intel CORE 2 DUO w/ rPath linux 2.6.29 64-bit | 12/10/2009 |
SHA-256 
(BYTE-only) "Alliance Hash Library is a software library providing SHA hash and HMAC services." 01/12/10: Update OES; |
1143 | RSA Security, Inc. 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 1.1 |
Intel Pentium D w/ Windows XP SP3 Pro w/ JME SDK 3.0 CDC Runtime Env | 12/10/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE TLS-J ME security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" |
1142 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada -Iain Holness
|
Version 0.9.8 (Firmware) |
AMD Geode LX 800 w/ Linux kernel 2.6; Intel Core 2 Duo E8500 LGA775 w/Linux kernel 2.6 | 12/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SxE Cryptographic Library provides cryptographic algorithms for the SxE family of products. Based on OpenSSL, the SxE Cryptographic Library exposes an Application Programming Interface (API) to support software based security relevant services within SafeNet''s SxE product line." 11/24/10: Add new tested information; |
1141 | Persistent Systems, LLC 303 Fifth Avenue Suite 207 New York, NY 10016 USA -David Holmer
|
Version 1.0 (Firmware) |
Intel IXP4XX | 12/10/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Wave Relay Mobile Ad Hoc Networking System provides persistent wireless network connectivity between highly mobile users in a true peer-to-peer topology. The Wave Relay Cryptographic Library provides module integrity assurance and management security." |
1140 | Persistent Systems, LLC 303 Fifth Avenue Suite 207 New York, NY 10016 USA -David Holmer
|
Part # Version 1.0 |
N/A | 12/10/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Wave Relay Mobile Ad Hoc Networking System provides persistent wireless network connectivity between highly mobile users in a true peer-to-peer topology. The Wave Relay Cryptographic Engine is a hardware cryptographic accelerator which enables high speed communication security." |
1139 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Joel Tang
|
Version 3.0.0.1 (Firmware) |
AE2251 | 12/10/2009 |
SHA-256 
(BYTE-only) "As the world''s leading memory manufacturer, Kingston offers the marketplace a variety of secure USB devices designed to protect data at rest. By utilizing 256 bit AES encryption, The Kingston DT4000 Series USB Flash Drive offers a high level of security certified to FIPS 140-2 standards." |
1138 | N/A | N/A | N/A | 11/24/2009 | N/A |
1136 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -James Reardon
|
Version 0.9.8 |
Intel Xeon w/ Windows Server 2003 | 11/24/2009 |
SHA-1     
(BYTE-only) "McAfee Network Security Platform is a network-class IPS appliance that protects every network-connected device by blocking attacks in real time before they can cause damage. The NSM Secure UI Crypto Module uses OpenSSL to provide cryptographic services for serving the Network Security Manager console through a secure TLS session." |
1135 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -James Reardon
|
Version 4.0 |
Intel Xeon w/ Windows Server 2003 | 11/24/2009 |
SHA-1     
(BYTE-only) "McAfee Network Security Platform is a network-class IPS appliance that protects every network-connected device by blocking attacks in real time before they can cause damage. The NSM Application Crypto Module uses BSAFE to provide cryptographic services for the Network Security Manager application." 12/17/09: Update implementation information; |
1134 | BlockMaster AB Kyrkogatan 17 Lund, S-222 22 Sweden -Johan Söderström
-Anders Pettersson
|
Version 4.0 (Firmware) |
BlockMaster BM9931 | 11/24/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The BlockMaster controller BM9931 powers FIPS secure USB flash drives. All data stored is encrypted in accordance with the specification of the Federal Information Processing Standard (FIPS 140-2)." |
1133 | Firetide, Inc. 140 Knowles Dr. Los Gatos, CA 95032 USA -Murali Repakula
|
Version Openssl-0.9.8k (Firmware) |
Cavium CN5020SCP | 11/24/2009 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "Openssl library is a standard release from OpenSSL organization used in FTOS firmware." |
1132 | KoolSpan Inc. 4962 Fairmont Ave., 2nd Floor Bethesda, Maryland 20814 United States -Paul Benware
-Bill Supernor
|
Version 3.0 |
ARM 32-bit w/ Symbian OS 9.2; ARM 32-bit w/ Symbian OS 9.1 | 11/24/2009 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library provides cryptographic security functions (C APIs) for application developers to integrate cryptographic services into a library application or system." |
1131 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 3.0 (Firmware) |
Intel Xeon; CentaurHauls Via Nemehiah; Intel Pentium; Intel Pentium 4 | 11/24/2009 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v3.0 runs on an Intel x86 compatible processor using the FortiMail OS." |
1130 | VIA Technologies, Inc. 940 Mission Court Fremont, CA 94539 USA -mkt@via.com.tw
-Tom Crispin
|
Part # 1.0 |
N/A | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The VIA PadLock™ Security Engine is hardware-based security integrated into VIA's power-efficient x86 CPUs to deliver up to 80-times faster cryptographic performance. Instead of offloading cryptography to a coprocessor, the x86 instruction stream is enhanced to accelerate cryptographic operations within the standard x86 programming environment." |
1129 | VIA Technologies, Inc. 940 Mission Court Fremont, CA 94539 USA -mkt@via.com.tw
-Tom Crispin
|
Part # 1.0 |
N/A | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The VIA PadLock Security Engine is hardware-based security integrated into VIA's power-efficient x86 CPUs to deliver up to 80-times faster cryptographic performance. Instead of offloading cryptography to a coprocessor, the x86 instruction stream is enhanced to accelerate cryptographic operations within the standard x86 programming environment." |
1128 | VIA Technologies, Inc. 940 Mission Court Fremont, CA 94539 USA -mkt@via.com.tw
-TOM CRISPIN
|
Part # 1.0 |
N/A | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The VIA PadLock™ Security Engine is hardware-based security integrated into VIA's power-efficient x86 CPUs to deliver up to 80-times faster cryptographic performance. Instead of offloading cryptography to a coprocessor, the x86 instruction stream is enhanced to accelerate cryptographic operations within the standard x86 programming environment." |
1127 | Thales nCipher Jupiter House Station Road Cambridge, CB1 2JD UK -Marcus Streets
-Mark Wooding
|
Version 0.1.34 (Firmware) |
Intel Core2 Duo | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The nShield Connect Algorithm Library provides cryptographic functionality for Thales nCipher's nShield Connect hardware security modules." |
1126 | Ipswitch, Inc. 10 Maguire Road, Suite 220 Lexington, MA 02421 USA -Mark Riordan
|
Version 1.2.0.0 |
Intel Core 2 Duo w/ Windows Server 2008 (x64); Intel Pentium 4 w/ Windows Server 2008 (x86); Intel Core 2 Duo w/ Red Hat Enterprise Linux v5 (x64); Intel Pentium 4 w/ Red Hat Enterprise Linux v5 (x86) | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "MOVEit Crypto is a compact and fast dynamically-linked library for Windows and Linux. It provides AES encryption, SHA-1 and SHA-2 hashing, and pseudo-random number generation. Both 32-bit and 64-bit versions are available for each operating system. MOVEit Crypto is a member of the MOVEit security and file transfer product family." |
1125 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 2.6.18-164.2.1.el5 |
Intel Itanium 2 w/ Red Hat Enterprise Linux 5.4; AMD Opteron w/ Red Hat Enterprise Linux 5.4 | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel." |
1124 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.3 |
AMD x86 w/ Windows XP; AMD x64 w/ Windows XP; AMD x86 w/ Ubuntu 8; AMD x86 w/ Windows Server 2003 | 11/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A software cryptographic module supporting encryption, authentication, and data redundancy techniques running on either Linux user or Windows kernel mode." |
1123 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551 Min-Tsu Road SEC.5 Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 1.1 (Firmware) |
Renesas AE57C1 | 11/5/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HiCOS v3.1 GP PKI Smart Card supports AES, Triple-DES, SHA-1, SHA-256, SHA-384, SHA-512, HMAC-MD5, HMAC-SHA1, HMAC-SHA256, HMAC-SHA384, HMAC-SHA512, RSA-1024, RSA-2048 and FIPS 186-2 RNG Implementations. This product provided PKI applet." |
1122 | Good Technology 101 Redwood Shores Parkway Suite 401 Redwood City, CA 94065 USA -Sriram Krishnan
|
Version 4.7.0.50906 |
Qualcomm MSM7201A w/ Windows CE 5.2 | 11/5/2009 |
SHA-1     
(BYTE-only) "FIPSCrypto is a software-based algorithm implementation that supports Triple-DES, AES, SHA1, and HMAC-SHA1. FIPSCrypto is FIPS 140-2 validated cryptographic module for use on Pocket PC and Windows Mobile." |
1121 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN3860 NSP w/ SonicOS 5.5.1 | 11/5/2009 |
SHA-1     
(BYTE-only) "The SonicWALL E-Class Network Security Appliance (NSA) Series is engineered to provide high performance Unified Threat Managment (UTM) threat prevention and application inspection to meet the needs of expanding enterprise networks." |
1120 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN3860 SCP w/ SonicOS 5.5.1 | 11/5/2009 |
SHA-1     
(BYTE-only) "The SonicWALL E-Class Network Security Appliance (NSA) Series is engineered to provide high performance Unified Threat Managment (UTM) threat prevention and application inspection to meet the needs of expanding enterprise networks." |
1119 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN3840 SCP w/ SonicOS 5.5.1 | 11/5/2009 |
SHA-1     
(BYTE-only) "The SonicWALL Network Security Appliance (NSA) Series is a high performance platform utilizing a unique multi-core architecture to provide high speed anti-virus, anti-spyware, intrusion prevention, content filtering, application inspection and protection and for the SMBs and large businesses." |
1118 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN3830 SCP w/ SonicOS 5.5.1 | 11/5/2009 |
SHA-1     
(BYTE-only) "The SonicWALL Network Security Appliance (NSA) Series is a high performance platform utilizing a unique multi-core architecture to provide high speed anti-virus, anti-spyware, intrusion prevention, content filtering, application inspection and protection and for the SMBs and large businesses." |
1117 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.0 (Firmware) |
Quad-Core Intel® Xeon® | 11/5/2009 |
SHA-1     
(BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices." |
1116 | Exar Corporation 48720 Kato Road Fremont, CA 94538 USA -Zack Mihalis
-Jeffrey Chan
|
Part # 9700-002F |
N/A | 11/5/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Exar 97xx is an application services processor family designed for storage capacity optimization and data protection. 97xx accelerates algorithms such as LZS/eLZS compression, AES-GCM/XTS/CBC encryption and SHA1/256 hash for deduplication. It has a throughput up to 1800MB/s and can compress, encrypt and hash in a single pass." |
1115 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version OpenSSL-5.2.193.0 (Firmware) |
Motorola MPC8540 PowerQUICC III | 11/5/2009 |
SHA-1     
(BYTE-only) "Cisco Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture." |
1114 | CipherOptics, Inc. 701 Corporate Center Drive Raleigh, NC 27607 USA -Casey Carr
|
Version 1.0 (Firmware) |
RMI XLS; RMI XLR | 10/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CipherOptics CEP IP Ethernet Encryptors are hardware accelerated encryption appliances that provides flexible Ethernet frame encryption." |
1113 | Sagem Orga 18, rue de la Vanne Montrouge, 92120 France -Nicolas Goniak
|
Version 01007298-FFFFFFF (Firmware) Part # AT58829 Version D |
Atmel AT58829 Version D | 10/26/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Implementation of the FIPS 180-2 SHA-1 and SHA-256 algorithms for the ypsid cryptographic module." |
1112 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 1.3.2 (Firmware) |
IBM 750CL | 10/26/2009 |
SHA-1     
(BYTE-only) "The Lexmark PrintCryption is an option for the Lexmark printers that enables the transfer and printing of encrypted print jobs. With the PrintCryption module installed, the printer is capable of decrypting print jobs encrypted with AES. " |
1111 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 1.3.2 (Firmware) |
ARM9 | 10/26/2009 |
SHA-1     
(BYTE-only) "The Lexmark PrintCryption is an option for the Lexmark printers that enables the transfer and printing of encrypted print jobs. With the PrintCryption module installed, the printer is capable of decrypting print jobs encrypted with AES. " |
1110 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 3.2.1.3400BB |
Alchemy Au1250 w/ Windows CE 5.0 | 10/26/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Secure Client is a software module designed to deliver security on wireless devices such as bar scanners, handhelds, and laptops using various operating systems. A plug-and-play solution, the Client encrypts and decrypts communication across the WLAN and protects the device against attacks without user intervention." |
1109 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.0 (Firmware) |
Quad-Core Intel® Xeon® | 10/26/2009 |
SHA-1     
(BYTE-only) "The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices." |
1108 | Integral Memory PLC. Unit 6 Iron Bridge Close Iron Bridge Business Park Off Great Central Way London, Middelsex NW10 0UF United Kingdom -Partrick Warley
-Francesco Rivieccio
|
Version PS2251-65 (Firmware) |
Phison PS2251 | 10/26/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Integral 256 bit Crypto Dual & Dual + drives are removable storage devices which encrypt data transferred onto them. They offer Premium AES 256 bit security, and come in various sizes." 08/01/12: Updated vendor and implementation information; |
1107 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version EbemCrypto Version 6 (Firmware) |
IBM PowerPC | 10/26/2009 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "Implements authentication, key negotiation/generation, and controls FPGA implementation of traffic encryption in ViaSat''s Enhanced Bandwidth Efficient Modem (EBEM-500)." |
1106 | Comtech Mobile Datacom Corporation 20430 Century Boulevard Germantown, MD 20874 USA -Sebastian Morana
|
Version 0.1.L (Firmware) |
ARM STR911FA-M42X6 | 10/14/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Transceiver Cryptographic Module is a compact hardware module with firmware implementation for cryptographic algorithms." 11/18/09: Update implementation information; |
1105 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon 5010 w/ SonicOS 5.5.1 | 10/14/2009 |
SHA-1     
(BYTE-only) "SonicWALL TZ Series is a high performance security platform that combines anti-virus, anti-spyware, intrusion prevention, content filtering, 3G connectivity and redundancy with 802.11 b/g/n wireless for an ultimate SMB security package. These solutions allow to easily implement complete network protection from a wide spectrum of emerging threats." |
1104 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Mike Soto
|
Version 12.4(15)T10 (Firmware) |
MIPS BCM1125H; QED RM5161A; MIPS 7065C | 10/14/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 1800, 2800 and 3800 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments" |
1103 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN3120 w/ SonicOS 5.5.1 | 10/9/2009 |
SHA-1     
(BYTE-only) "The SonicWALL Network Security Appliance (NSA) Series is a high performance platform utilizing a unique multi-core architecture to provide high speed anti-virus, anti-spyware, intrusion prevention, content filtering, application inspection and protection for the SMBs and large businesses." |
1102 | SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124 USA -Usha Sanagala
|
Version 5.5.1 |
Cavium Octeon CN5020 w/ SonicOS 5.5.1 | 10/9/2009 |
SHA-1     
(BYTE-only) "The SonicWALL E-Class Network Security Appliance (NSA) Series is engineered to provide high performance Unified Threat Management (UTM) threat prevention and application inspection to meet the needs of expanding enterprise networks." |
1101 | Motorola Solutions Inc. Unit A1, Linhay Business Park Ashburton, Devon TQ13 7UP UK -Richard Carter
|
Version PTP600-SHA-02-00 (Firmware) |
TI C6414 DSP | 10/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Motorola family of PTP Wireless Ethernet Bridges offers a solution to the challenge of establishing a reliable, secure, point-to-point network connection. Whether operating in a Non-Line-of-Sight (NLoS), adverse or marginally adverse environment." |
1100 | AirMagnet, Inc. 1325 Chesapeake Terrace Sunnyvale, CA 94089 USA -Ambareesh Sriram
-Terrin Eager
|
Version 1.0 |
Intel Pentium 4 w/ Microsoft Windows Server 2003 SP2 | 10/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AirMagnet Enterprise Server provides a centralized repository for all system alarms and policies. The server provides centralized control and management of all sensors and system-wide settings for all security and performance features and functions." |
1099 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.4-5.el5 |
AMD Opteron w/ Red Hat Enterprise Linux 5.4 | 10/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 64bit word size." |
1098 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.4-5.el5 |
AMD Opteron w/ Red Hat Enterprise Linux 5.4 | 10/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program. The module was tested with 32bit word size." |
1097 | NASA Code 582.0 NASA Goddard Space Flight Center n/a Greenbelt, MD 20771 USA -Krishnan A. Narayanan
|
Version 1.0 (Firmware) |
Motorola MCP750; BAE RAD 750 | 10/9/2009 |
SHA-224 
(BYTE-only) "HMAC SHA-224 Implementation in the Flight Software for the NASA Global Precipitation Measurement (GPM) Mission." 04/26/10: adding OE |
1096 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Joel Tang
|
Version 3.00.10 (Firmware) |
Phison Electronics AE2251 | 10/9/2009 |
SHA-256 
(BYTE-only) "Kingston''s DataTraveler DT4000 Series USB Flash Drive is assembled in the US for organizations that require a secure way to store and transfer portable data. The stored data is secured by hardware-based AES-256 encryption to guard sensitive information in case the drive is lost or stolen." |
1095 | Cisco Systems, Inc. 175 West Tasman Dr. San Jose, CA 95134 USA -Basavaraj Bendigeri
|
Version 4.1(3a) (Firmware) |
Intel Pentium III; Motorola PPC 7447a | 10/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "These are the cryptographic algorithm implementations for the Supervisor 1 modules which are used with Cisco MDS 9500 Series switches and Cisco MDS 9216i switch; as well as the Supervisor 2 modules which are used with Cisco MDS 9500 Series switches." |
1094 | N/A | N/A | N/A | 9/30/2009 | N/A |
1093 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 United States |
Version 3.1 (Firmware) |
Intel Xeon | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1092 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 United States |
Version 3.1 (Firmware) |
Intel Xeon | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1091 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 United States |
Version 3.1 (Firmware) |
Intel Core 2 Duo | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments." |
1090 | IBM Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 United States |
Version 1.0 |
AMD Opteron Processor 270 w/ Microsoft Windows Server 2003 R2 Standard, Version 5.2 SP 2 | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM Proventia Management SiteProtectorTM system is a security management system that provides centralized command and control, analysis, reporting and workflow for all ISS IBM Protection devices and select third-party security solutions." 06/03/10: OS updated |
1089 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 1.4.4-5.el5 |
Intel Itanium 2 w/ Red Hat Enterprise Linux 5.4 | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library derived from GnuPG which can now be linked to from any program." |
1088 | Motorola Unit A1 Linhay Business Park Ashburton, Devon TQ13 7UP UK -Richard Carter
|
Version PTP500-SHA-02-00 (Firmware) |
TI C6412 DSP | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Motorola family of PTP Wireless Ethernet Bridges offers a solution to the challenge of establishing a reliable, secure, point-to-point network connection. Whether operating in a Non-Line-of-Sight (NLoS), adverse or marginally adverse environment." 10/07/09: Update Processor; |
1087 | Motorola Unit A1 Linhay Business Park Ashburton, Devon TQ13 7UP UK -Richard Carter
|
Version PTP300-SHA-02-00 (Firmware) |
TI C6412 DSP | 9/30/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Motorola family of PTP Wireless Ethernet Bridges offers a solution to the challenge of establishing a reliable, secure, point-to-point network connection. Whether operating in a Non-Line-of-Sight (NLoS), adverse or marginally adverse environment." 01/07/09: Update Processor; |
1086 | Dolby Laboratories, Inc. 100 Potrero Ave. San Francisco, CA 94103 USA -Matthew Robinson
|
Version 1.0 (Firmware) |
VHDL/Verilog hardware simulator | 9/21/2009 |
SHA-1     
(BYTE-only) "An implementation of the SHA-1 algorithm as defined in FIPS PUB 180-3." |
1085 | FalconStor Software, Inc. 2 Huntington Quadrangle Melville, NY 11747 USA -Yeggy Javadi
-Wai Lam
|
Version 3.12.4 |
Intel Pentium D w/ Oracle Enterprise Linux 5.3 (64-bit) | 9/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic Library for Authentication and Encryption Implementations for All FalconStor Software Products." |
1084 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Part # 2.0 |
Hermon EL-T A6 | 9/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry® Smartcard Reader is a lightweight, wearable reader that enables controlled access to BlackBerry Smartphones and workstations using Bluetooth® technology and AES-256 encryption." 12/10/09: Update implementation information; |
1083 | Hewlett-Packard Company 19091 Pruneridge Ave. MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.0 |
Intel Xeon E5540 w/ CentOS v4.3 | 9/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP Enterprise Secure Key Manager (ESKM) automates key generation and management. It is a hardened security appliance delivering identity-based access, administration and logging. Additionally, the ESKM provides reliable lifetime key archival with automatic multi-site key replication and failover capabilities." 09/21/09: Update vendor information; |
1082 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 4.0 OS X |
Apple MacBook Pro 15" w/ MAC OS X 10.5 (i386) | 9/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Engine includes a wide range of field-tested and standards-based encryption, and encoding algorithms used in disk encryption." 05-05-10:Update OE |
1081 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tim Myers
|
Version 1.0 |
Intel Core 2 Duo w/ Windows 7 Ultimate (x64); Intel Core 2 Duo w/ Windows 7 Ultimate (x86); Intel Core 2 Duo w/ Windows Server 2008 R2 (x64); Intel Itanium 2 w/ Windows Server 2008 R2 (IA64); Intel Core 2 Duo w/ Windows Server 2008 R2 SP1 (x64); Intel Core 2 Duo w/ Windows 7 Ultimate SP1 (x64); Intel Core 2 Duo w/ Windows 7 Ultimate SP1 (x86); Intel Itanium2 w/ Windows Server 2008 R2 SP1 (IA64) | 9/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Symmetric Algorithm Implementation is used by various Microsoft libraries to provide the basic symmetric algorithms AES, SHA, and Triple-DES." 09/29/09: Add new tested OES'; |
1080 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version JUNOS 9.3R3 (Firmware) |
Cavium CN1010 | 9/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "J2320, J2350, J4350 and J6350 are modular routers for enterprises running desktops, servers, VoIP, CRM/ERP/SCM applications. They offer multiple PIM slots for additional LAN/WAN connectivity, Avaya VoIP Gateway, and WAN acceleration." |
1079 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version JUNOS 9.3R3 (Firmware) |
Intel Celeron; Intel Pentium 4 | 9/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "J2320, J2350, J4350 and J6350 are modular routers for enterprises running desktops, servers, VoIP, CRM/ERP/SCM applications. They offer multiple PIM slots for additional LAN/WAN connectivity, Avaya VoIP Gateway, and WAN acceleration." 09/29/09: Add new tested information; |
1078 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version JUNOS 9.3R3 (Firmware) |
Intel Celeron; Intel Pentium 4 | 9/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "J2320, J2350, J4350 and J6350 are modular routers for enterprises running desktops, servers, VoIP, CRM/ERP/SCM applications. They offer multiple PIM slots for additional LAN/WAN connectivity, Avaya VoIP Gateway, and WAN acceleration." 09/29/09: Add new tested information; |
1077 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version JUNOS 9.3R3 (Firmware) |
Cavium CN1010 | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "J2320, J2350, J4350 and J6350 are modular routers for enterprises running desktops, servers, VoIP, CRM/ERP/SCM applications. They offer multiple PIM slots for additional LAN/WAN connectivity, Avaya VoIP Gateway, and WAN acceleration." |
1076 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 5.0.0 (Firmware) |
Qualcomm MSM7600 processor with BlackBerry OS 5.0.0 | 8/31/2009 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Smartphones." |
1075 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 0.9.8e-22.el5_8.3 |
AMD Opteron w/ Red Hat Enterprise Linux 5.4 | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." 06/08/12: Updated implementation information; |
1074 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 0.9.8e-22.el5_8.3 |
AMD Opteron w/ Red Hat Enterprise Linux 5.4 | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size." 06/08/12: Updated implementation information; |
1073 | Red Hat, Inc. 1801 Varsity Drive Raleigh, NC 27606 USA -Irina Boverman
|
Version 0.9.8e-22.el5_8.3 |
Intel IA64 Itanium w/ Red Hat Enterprise Linux 5.4 | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size." 06/08/12: Updated implementation information; |
1072 | Tripwire, Inc. 101 SW Main St. Suite 1500 Portland, OR 97204 USA -Benjamin Jansen
|
Version Revno 262 |
Pentium D 3.0GHz w/ Sun Java 1.5 on Windows 2003 Server (32-bit) | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provides a SHA-1/224/256/384/512 implementation for Tripwire products." |
1071 | Thales e-Security Meadow View House, Crendon Industrial Estate Long Crendon Long Crendon, Aylesbury HP18 9EQ United Kingdom -Tim Fox
|
Version 1.0 (Firmware) |
Freescale MPC8548 | 8/31/2009 |
SHA-256 
(BYTE-only) "SHA-256 for TSPP Bootstrap" |
1070 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.85 (Firmware) |
Qualcomm MSM7600 processor with BlackBerry OS 5.0.0 | 8/31/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Smartphones." |
1069 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.0 (Firmware) |
Intel Xeon Quad Core; Intel Xeon; Via Eden ESP; Intel Pentium 4; Intel Pentium III; AMD Opteron Dual Core; Intel Core 2 Duo; Intel Celeron; AMD Geode | 8/21/2009 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet SSL Cryptographic Library v4.0 runs on an Intel x86 compatible processor using the FortiOS." |
1068 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 4.0 (Firmware) |
Intel Xeon Quad Core; Intel Xeon; Via Eden ESP; Intel Pentium 4; Intel Pentium III; AMD Opteron Dual Core; Intel Core 2 Duo; Intel Celeron; AMD Geode | 8/21/2009 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FIPS Cryptographic Library v4.0 runs on an Intel x86 compatible processor using the FortiOS." |
1067 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Yoko Enokida
-Lei Poo
|
Part # 88i8925 |
N/A | 8/21/2009 |
SHA-1     
(BIT) SHA-256  (BIT) Bit only "Solaris 2 is a highly integrated and custom System-on-Chip (SOC) product, customized for high performance hard disk drives. It employs the latest read/write channel technology with advanced detection and correction capabilities suitable for high density drives." |
1066 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
|
Version 1.2 (Firmware) |
Intel® Core(TM) 2 Duo | 8/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''s." |
1065 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Dave Olander
|
Version 2.6.26.5 (Firmware) |
Intel® Core(TM) 2 Duo | 8/17/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium''s GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP''s." |
1064 | Motorola, Inc. 6480 Via Del Oro San Jose, CA 95199 USA -Zeljko Bajic
-Colin Cooper
|
Version 1.2 (Firmware) |
CAVIUM OCTEON CN5010 | 8/17/2009 |
SHA-1     
(BYTE-only) "The AP-7131 802.11 Wireless Access Point delivers the throughput, coverage and resiliency required to build an all-wireless enterprise. The tri-radio design provides simultaneous support for high-speed wireless voice and data services, self-healing mesh networking and non-data applications such as Motorola''s Wireless IPS." |
1063 | Motorola, Inc. 6480 Via Del Oro San Jose, CA 95199 USA -Zeljko Bajic
-Colin Cooper
|
Version 1.2 (Firmware) |
CAVIUM OCTEON CN5010 | 8/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AP-7131 802.11 Wireless Access Point delivers the throughput, coverage and resiliency required to build an all-wireless enterprise. The tri-radio design provides simultaneous support for high-speed wireless voice and data services, self-healing mesh networking and non-data applications such as Motorola''s Wireless IPS." |
1062 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Mike Soto
|
Version 12.4(15)T9 (Firmware) |
MIPS BCM1125H; MIPS 7065C; QED RM5161A | 8/17/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 1800, 2800 and 3800 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments" |
1061 | Open Text Corp. 275 Frank Tompa Drive Waterloo, Ontario N2L 0A1 Canada -Jonathan Carroll
-Robert Wong
|
Version 1.0 |
Intel Core2 Quad w/ Microsoft Windows Vista (x86); Intel Core2 Quad w/ Microsoft Windows Vista (x64) | 8/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Open Text Encryption Module is installed as an add-in for a variety of Open Text products and performs encryption / decryption." |
1060 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version EbemCrypto Version 5 (Firmware) |
IBM PowerPC | 8/10/2009 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "Implements authentication, key negotiation/generation, and controls FPGA implementation of traffic encryption in ViaSat''s Enhanced Bandwidth Efficient Modem (EBEM-500)." |
1059 | Silex Technology 157 West 7065 South Salt Lake City, UT 84047 USA -Keith Sugawara
|
Version sx500_crypto_V1 (Firmware) Part # CN210 |
eCos on Cavium CN210 processor | 8/10/2009 |
SHA-1     
(BYTE-only) "SHA1 implementation used during wireless link authentication." |
1058 | Silex Technology 157 West 7065 South Salt Lake City, UT 84047 USA -Keith Sugawara
|
Version sx500_crypto_V1 (Firmware) Part # CN210 |
eCos on Cavium CN210 processor | 8/10/2009 |
SHA-1     
(BYTE-only) "SHA1 implementation used during wireless link authentication." |
1057 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 3.2 Build 3400G |
Intel PXA263 w/ Windows CE 4.0; Intel PXA27x w/ Windows CE 5.0 | 8/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Secure Client is a software module designed to deliver security on wireless devices such as bar scanners, handhelds, and laptops using various operating systems. A plug-and-play solution, the Client encrypts and decrypts communication across the WLAN and protects the device against attacks without user intervention." |
1056 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.7.1 (Firmware) |
StrongArm II (80219) | 8/10/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The K5 / K5e Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1055 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 5.1f |
ARM926T TI OMAP850 w/ Windows Mobile 6.1; ARM IXP420 w/ Debian 4.0 using Linux 2.6; Intel Core 2 Duo w/ OpenSuse 10.3 using Linux 2.6; ARM920 w/ Windows CE 5.0; SPARCv9 w/ Solaris 10; Intel Core 2 Duo w/ Windows XP; Freescale PowerQuic III w/ Intel/WindRiver Linux v3; Broadcom MIPS Processor w/ Intel/WindRiver VxWorks 5.5; Samsung ARM 11 w/ iPhone OS 3.1.3; PowerQuiccIII w/ VxWorks 6.4; Freescale e600 w/ VxWorks 5.5; PowerQuiccIII w/ VxWorks 5.5; | 8/10/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." 02/25/10: Update implementation information; |
1054 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 US -Malcolm Levy
|
Version R65 |
Intel® Core 2 Xeon(TM) Quad Core w/ Check Point SecurePlatform | 7/16/2009 |
SHA-1     
(BYTE-only) "Check Point''s VPN-1 version R65 is a tightly integrated software solution combining the FireWall-1 (FW-1) security suite with sophisticated Virtual Private Network (VPN) technologies and a hardened SecurePlatform operating system (OS)." |
1053 | Check Point Software Technologies, Ltd. 9900 Belward Campus Dr. Suite 250 Rockville, MD 20850 US -Malcolm Levy
|
Version VPN-1 R65 |
Intel® Core 2 Xeon(TM) Quad Core w/ Check Point SecurePlatform | 7/16/2009 |
SHA-1     
(BYTE-only) "Check Point''s VPN-1 version R65 is a tightly integrated software solution combining the FireWall-1 (FW-1) security suite with sophisticated Virtual Private Network (VPN) technologies and a hardened SecurePlatform operating system (OS)." |
1052 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Graydon Dodson
|
Version 1.3.0 (Firmware) |
ARM9 w/ Lexmark Linux v2.6; IBM 750CL w/ Lexmark Linux v2.6 | 7/16/2009 |
SHA-1     
(BYTE-only) "The Lexmark PrintCryption is an option for the Lexmark printers that enables the transfer and printing of encrypted print jobs. With the PrintCryption module installed, the printer is capable of decrypting print jobs encrypted with AES." |
1051 | Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 USA -Prateek Jain
|
Version 5.2.9 |
Dual Xeon QuadCore w/ Linux based on Red Hat Enterprise Version 5.1 | 7/16/2009 |
SHA-1     
(BYTE-only) "Accellion web application uses the SHA1 implementation to calculate the hash of the user password input for authentication purposes." |
1050 | Red Hat, Inc. and Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 USA -Glen Beasley
-Robert Relyea
|
Version 3.12.4 |
Intel Core 2 Duo w/ Mac OS X 10.5 (32-bit); Intel Core 2 Duo w/ Mac OS X 10.5 (64-bit); AMD Opteron w/ Windows XP Professional SP3 (32-bit) | 7/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/." |
1049 | Red Hat, Inc. and Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 USA -Glen Beasley
-Robert Relyea
|
Version 3.12.4 |
Sun UltraSPARC III Cu w/ Sun Solaris 10 5/08 (32-bit); Sun UltraSPARC III Cu w/ Sun Solaris 10 5/08 (64-bit); AMD Opteron w/ Sun Solaris 10 5/08 (32-bit); AMD Opteron w/ Sun Solaris 10 5/08 (64-bit) | 7/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/." 10/07/09: Update OES; |
1048 | Red Hat, Inc. and Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 USA -Glen Beasley
-Robert Relyea
|
Version 3.12.4 |
AMD Opteron w/ Red Hat Enterprise Linux v5 (32-bit); Intel Xeon w/ Red Hat Enterprise Linux v5 (64-bit) | 7/10/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/." 10/07/09: Update OES; |
1047 | Comtech Mobile Datacom Corporation 20430 Century Boulevard Germantown, MD 20874 USA -Ngone Boissy
|
Version 1.0 |
Intel Celeron (x86) w/ Red Hat Enterprise Linux v5.0 | 7/1/2009 |
SHA-1     
(BYTE-only) "libcmscrypto is a library implemented in the Comtech Mobile Datacom Corp. products and provides the basic cryptographic functionality that includes Advanced Encryption Standard (AES) algorithm, SHA1 message digest, HMAC SHA-1 Keyed-Hash message authentication code." |
1046 | LifeSize Communications Inc. 901 S. Mopac Building 3 Suite 300 Austin, Texas 78746 USA -Wes Bemont
-Joe Bulger
|
Version 1.0 |
Freescale MPC8272 PowerQUICC II w/ Linux kernel 2.4 | 7/1/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The LifeSize Cryptographic Security Kernel provides the cryptographic functionality required to secure high-definition audio and video conference communications." |
1045 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 2.0.0.7 |
Microsoft XP Professional SP3 | 7/1/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Library is the software module that provides advanced cryptographic functionality to all BlackBerry desktop related products" 08/03/09: Update implementation information; |
1044 | Cimcor 8252 Virginia St. Merrillville, IN 46410 USA -Robert Johnson
|
Version 1.0 |
PowerPC G4 w/ Apple Computer Mac OS X Version 10.3.6; Intel Xeon w/ Solaris™ 10 Release 11/06; Intel Pentium 4 w/ Microsoft Windows Server 2003 SP2; Intel Pentium 4 w/ Microsoft Corporation Windows 2000 (Server) SP3 and Q326886 Hotfix; Intel Itanium2 w/ Hewlett-Packard HP–UX 11i Version 3; Intel Xeon w/ Windows Vista; Intel Xeon w/ Windows Server 2008; Intel Xeon w/ Red Hat Enterprise Linux Version 5.1 | 7/1/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cimcor Cryptographic Module is a multi-platform library that provides secure FIPS 140-2 validated hashing, encryption, and decryption methods and a variety of other cryptographic functions." 12/18/09: Add new tested OES'; |
1043 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version 9.01.00 (Firmware) Part # MAXQ1959B-F50# |
Maxim MAXQ1959 | 7/1/2009 |
SHA-1     
(BYTE-only) Only supports SHA messages up to 4096-bytes "The Pitney Bowes iButton Postal Security Device (PSD) complies with FIPS 140-2 standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
1042 | Memory Experts International Inc. 227 Montcalm Suite 101 & 202 Gatineau, Quebec J8Y 3B9 Canada -Larry Hamid
|
Version 1.3 (Firmware) |
Bluefly Processor | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals." |
1041 | Pierson Capital Technology, LLC and Pierson Capital Technology (Beijing), LTD
(Beijing), LTD Centerville Road, Suite 400 Wilmington, Delaware 19808 USA Level 18, Suite 9, Oriental Plaza 1, East Chang An Avenue, Dong Cheng District, Beijing 100738 P.R. China -Frank Psaila
|
Version 1.0 (Firmware) |
STM32 | 6/26/2009 |
SHA-1     
(BYTE-only) "The objective of the MIIKOO System is to offer highly secure access for sensitive applications such as e-banking, e-purse cash downloads, secure e-commerce and Dynamic PIN for existing POSes and ATMs. " 07/07/09: Update vendor and implementation information; |
1040 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -YJ Kim
|
Part # -Y |
N/A | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN58XX - SCP, NSP family of multi-core MIPS64 processors targets intelligent, multi-gigabit networking, encryption, reg-ex acceleration, compression, TCP acceleration and Qos. This processor family includes part numbers CN5830SCP. CN5830NSP, CN5840SCP, CN5840NSP, CN5850SCP, CN5850NSP, CN5860SCP and CN5860NSP." |
1039 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -YJ Kim
|
Part # -Y |
N/A | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON Plus CN54/55/56/57XX SSP, SCP, NSP multi-core MIPS64 processor family targets intelligent, multi-gigabit networking, encryption, RAID, compression, TCP acceleration, QOS. Includes P/Ns CN5740SSP, CN5745SSP, CN5750SSP, CN5640NSP, CN5645NSP, CN5650NSP, CN5540SSP, CN5530SSP, CN5534SSP, CN5430NSP, CN5434R-SCP, CN5434NSP." |
1038 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -YJ Kim
|
Part # -Y |
N/A | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN52XX-SCP family of multi-core MIPS64 processors targets intelligent, multi-gigabit networking, encryption, TCP acceleration, QoS, RAID and De-dup acceleration. This processor family includes part numbers CN5220SCP, CN5225SCP and CN5230SCP." |
1037 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -YJ Kim
|
Part # Rev 1 |
N/A | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN50XX SCP family of multi-core MIPS64 processors targets intelligent, multi gigabit networking, encryption, TCP acceleration and QoS. This processor family includes CN5010SCP and CN5020SCP." |
1036 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA -Ramu Ramakesavan
|
Version 1.1.1.2.2.0 (Firmware) |
Intel® EP80579 Integrated Processor with Intel® Quick Assist Technology , Stepping B0 | 6/26/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Intel ® EP80579 Integrated Processor with Intel® Quick Assist Technology is System on a Chip with an IA core, cryptographic accelerators, and other components. The accelerator features are invoked using Intel ® QuickAssist API developed with Intel''s partners to allow application scalability across multiple HW and SW vendors." |
1035 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 1.6.0 Update 13 (Firmware) |
Intel Celeron; Intel Core 2 Duo | 6/26/2009 |
SHA-1     
(BYTE-only) "This library design runs as part of the Java Runtime Environment (JRE). It provides cryptographic services to Java based VPN services and Administrative services running within a Java Virtual Machine. It is developed by Sun Microsystems and distributed as part of the Java JRE." |
1034 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 0.98e (Firmware) |
Intel Celeron; Intel Core 2 Duo | 6/26/2009 |
SHA-1     
(BYTE-only) "This library design runs as a linked module in processes running in the Linux User Space. It provides services to Linux User Space Process based VPN services and Administrative services. It is developed by the OpenSSL open source community and distributed as part of OpenSSL." |
1033 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 1.0 (Firmware) |
Intel Celeron; Intel Core 2 Duo | 6/26/2009 |
SHA-1     
(BYTE-only) "This library design runs as a linked module within the Linux Kernel. It provides cryptographic services to VPN services running within the context of the Linux Kernel. It is SonicWALL, Inc. developed and is loosely based upon the standard OpenSSL libcrypto library." |
1032 | RSA Security, Inc. 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 4.1 |
Intel Pentium D w/ Windows XP Professional SP2, Sun JRE 5.0; Intel Pentium D w/ Windows XP Professional SP2, Sun JRE 6.0 | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements" |
1031 | KoolSpan Inc. 4962 Fairmont Ave., 2nd Floor Bethesda, Maryland 20814 United States -Paul Benware
-Bill Supernor
|
Version 3.0 |
ARM 32 w/ Windows Mobile 5; ARM 32 w/ Windows Mobile 6; ARM 32 w/ Windows Mobile 6.1; Intel Core 2 Duo w/ Fedora 10; Intel Pentium Core 2 Duo w/ MAC OS X 10.5; Intel Core 2 Duo w/ Microsoft Windows Server 2003 R2; Intel Core 2 Duo w/ Microsoft Windows XP; Intel Core 2 Quad w/ Microsoft Windows Server 2003 R2; Intel Pentium Core 2 Quad w/ Microsoft Windows Server 2008 Standard; Intel Core 2 Quad w/ Microsoft Windows XP; Intel Pentium Dual Core w/ MAC OS X 10.4; Intel Pentium 4 w/ Microsoft Windows Server 2003 R2; Intel Xeon w/ Fedora 10; Intel Xeon w/ Microsoft Windows Server 2003 R2; Intel Pentium Xeon w/ Microsoft Windows Server 2008 Standard x64; ARM 7 w/ Linux 2.6 (Android) | 6/17/2009 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library provides cryptographic security functions (C APIs) for application developers to integrate cryptographic services into a library application or system." 03/08/11: Add new tested information; |
1030 | IBM Corporation 2455 South Road Poughkeepsie, NY 12601 USA -William Penny
-Alyson Comer
|
Version OA26457 |
IBM System z10™ Enterprise Class (z10 EC) w/ IBM z/OS® V1.10 | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based application programming interfaces that allow applications to protect data using the SSL and TLS protocols. In addition, z/OS System SSL enables applications to create and manage X.509 V3 certificates and keys within key database files or PKCS#11 tokens and use them as well as certificates and keys." |
1029 | IBM Corporation 2455 South Road Poughkeepsie, NY 12601 USA -William Penny
-Alyson Comer
|
Version OA26457 |
IBM System z10™ Enterprise Class (z10 EC) w/ IBM z/OS® V1.10 | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "z/OS® System SSL provides a rich set of C based application programming interfaces that allow applications to protect data using the SSL and TLS protocols. In addition, z/OS System SSL enables applications to create and manage X.509 V3 certificates and keys within key database files or PKCS#11 tokens and use them as well as certificates and keys." |
1028 | RSA, The Security Division of EMC 228 South Street Hopkinton, MA 01748 USA -Jeff Stone
-Nirav Mehta
|
Version 1.3.1 |
Intel Pentium D w/ Windows Server 2003 SP2 (32-bit); Intel Pentium D w/ Windows Server 2003 SP2 (64-bit); Intel Itanium2 w/ Windows Server 2003 SP2 | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "RSA BSAFE® Crypto Kernel provides core cryptographic functionality optimized for very small code size and speed to meet the needs of the most constrained environments. It is the cryptographic foundation for RSA BSAFE security products designed for C/C++ developers." |
1027 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 880074001F, v03.00.04 |
N/A | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Data Traveler is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." 07/07/09: Update implementation description; |
1026 | DELL, Inc. One Dell Way Round Rock, Texas 78682 USA -Irina Boverman
|
Version openssl-0.9.8e-7.el5 |
Intel Xeon EM64T w/ Red Hat Enterprise Linux 5.3 | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "TDES, AES, SHA-1, and RSA as used and provided by RHEL5 U1 on DELL 11G servers" |
1025 | Advanced Communications Concepts 8831 Capital of Tx Hwy Suite 212 n/a Austin, Texa 78759 USA -Eric Sweeney
|
Version 2.32.0.0 |
Intel Core 2 Duo w/ Windows Vista; Core 2 Duo w/ Windows XP; Intel Core 2 Duo w/Microsoft Windows 7 (64-bit edition); Intel Core 2 Duo w/ Microsoft Windows 7 (32-bit edition); Intel Core 2 Duo w/ Microsoft Windows Vista (64-bit edition) | 6/17/2009 |
SHA-512 
(BYTE-only) "The TUCrypt.sys module is a kernel mode exported driver which provides cryptographic services to a device driver for Windows XP/Vista." 01/25/10: Add new tested OES'; |
1024 | BitArmor Systems, Inc. Three Gateway Center 401 Liberty Avenue Suite 1900 Pittsburgh, PA 15222 USA -Dean Palamides, Software Architect
-Matthew White, VP of Engineering
|
Version 1.2 |
Intel® Pentium® 4 w/ Microsoft Windows XP (32-bit); Intel® Core(TM)2 w/ Microsoft Windows XP (32-bit); Intel® Core(TM)2 w/ Microsoft Windows Vista Ultimate (32-bit); Intel® Xeon® w/ SuSE Linux Enterprise Server 10.0 (32-bit); Intel® Core(TM)2 w/ SuSE Linux Enterprise Server 10.0 (32-bit); Intel® Xeon® w/ Microsoft Windows Server 2008 (64-bit); Intel® Core(TM)2 w/ Microsoft Windows Server 2008 (64-bit); Intel® Xeon® w/ Microsoft Windows Server 2008 (32-bit); Intel® Core(TM)2 w/ Microsoft Windows Server 2008 (32-bit); Intel® Xeon® w/ Microsoft Windows Server 2003 (64-bit); Intel® Core(TM)2 w/ Microsoft Windows Server 2003 (64-bit); Intel® Xeon® w/ Microsoft Windows Server 2003 (32-bit); Intel® Core(TM)2 w/ Microsoft Windows Server 2003 (32-bit); Intel® Core(TM)2 w/ Microsoft Windows 7 Enterprise (32-bit) | 6/17/2009 |
SHA-1     
(BYTE-only) SHA-256  (BIT) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BitArmor Secure Cryptographic Engine is a software module that provides core cryptographic security functionality to BitArmor DataControl(TM) software products, including strong encryption, secure integrity and authentication, and random number generation." 11/25/09: Add new tested OES; |
1023 | Prism Payment Technologies (Pty) Ltd, a subsidiary of Net1 UEPS technologies Inc. President Place Corner Jan Smuts Avenue & Bolton Road P O Box 2424, Parklands, 2121 Gauteng, Gauteng 2121 South Africa -Gerhard Claassen - Head Security Business Unit
|
Version Version: 2.0 (Firmware) Part # 0610-00575 |
FPGA | 6/4/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Incognito TSM500 is a multi-chip embedded Tamper Responsive Security Module. Fitted on a PCI carrier card, the device offers high-performance, high-security services targeted at EFT switches and mCommerce applications. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor." |
1022 | Cellcrypt Limited Liberty House 222 Regent Street n/a London, W1B 5TR UK -Tobias Poppe
|
Version 0.6.0-rc3 |
Intel® Pentium® 4 w/ Ubuntu Server | 6/4/2009 |
SHA-384 
(BYTE-only) SHA-512  (BYTE-only) "Crypto Core for secure communication platform" |
1021 | BeCrypt Ltd. 130 Shaftesbury Avenue London, W1D 5EU United Kingdom -Pali Surdhar
-Nigel Lee
|
Version 2.0 |
Intel Core2 Duo w/ Apple MacOS X; Intel Core2 Duo w/ Ubuntu Linux 8.10; Intel Core2 Duo w/ Microsoft Windows XP (64-bit); Intel Core2 Duo w/ Microsoft Windows XP (32-bit) | 5/29/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt's Enterprise security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments." 07/13/09: Update implementation information; |
1020 | BeCrypt Ltd. 130 Shaftesbury Avenue London, W1D 5EU United Kingdom -Pali Surdhar
-Nigel Lee
|
Version 2.0 |
Intel Core2 Duo w/ Real Mode pre-boot environment | 5/29/2009 |
SHA-256 
(BYTE-only) "The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt''s Enterprise security products providing a capability to develop complex and flexible security applications that require cryptographic functionality in both pre-OS and 32 bit operating environments." |
1019 | Tropos Networks 555 Del Rey Ave. Sunnyvale, CA 94085 USA -Roman Arutyunov
-Sreedhar Kamishetti
|
Version OpenSSL_0.9.8j_FIPS_1.2 |
Intel Pentium 4 w/ CentOS 5 | 5/29/2009 |
SHA-1     
(BYTE-only) "Tropos Control is a comprehensive management system that streamlines the deployment, optimization, maintenance, and control of large-scale wireless networks. Tropos Control uses FIPS 140-2 approved algorithms to provide secured communication to Tropos routers and to its web-based client application." |
1018 | Tropos Networks 555 Del Rey Ave. Sunnyvale, CA 94085 USA -Roman Arutyunov
-Sreedhar Kamishetti
|
Version NSS 3.11.4 |
Intel Pentium 4 w/ CentOS 5 | 5/29/2009 |
SHA-1     
(BYTE-only) "Tropos Control is a comprehensive management system that streamlines the deployment, optimization, maintenance, and control of large-scale wireless networks. Tropos Control uses FIPS 140-2 approved algorithms to provide secured communication to Tropos routers and to its web-based client application." |
1017 | Tropos Networks 555 Del Rey Ave. Sunnyvale, CA 94085 USA -Michael Ren
-Sreedhar Kamishetti
|
Version IPsec_2.6 (Firmware) |
AMCC Power PC 440EP | 5/29/2009 |
SHA-1     
(BYTE-only) "IPsec NETKEY crypto library" |
1016 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA |
Part # Hardware Rev A1 |
N/A | 5/28/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Kingston DataTraveler DT4000 Series USB Flash drive is assembled in the U.S. for organizations that require a secure way to store and transfer portable data. The stored data is secured by hardware-based 256-bit AES encryption to guard sensitive information in case the drive is lost or stolen." |
1015 | STMicroelectronics 4690 Executive Drive, Suite 200 San Diego, CA 92130 USA -Arnaud Pate-Cazal
-Rahul Seth
|
Part # ST-HCSL3-PC-SHA Version 1.0 |
N/A | 5/28/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The STM HardCache™SL3/PC is a secure ASIC used for Access Control and Data Storage Encryption in PC application. It integrates a dedicated RISC processor coupled with a HW accelerated Cryptographic Engine." 05/26/09: Update implementation info; |
1014 | N/A | N/A | N/A | 5/15/2009 | N/A |
1013 | Eastman Kodak Company 343 State Street Rochester, NY 14650 USA -Nancy Telfer
|
Version 0.9.8f (Firmware) |
Xilinx Virtex5 FPGA | 5/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Embedded firmware implementation of OpenSSL providing support for AES (encrypt/decrypt), RSA (sign/verify), SHA-1, SHA-256, HMAC SHA-1 and X9.31 PRNG." |
1012 | Eastman Kodak Company 343 State Street Rochester, NY 14650 USA -Nancy Telfer
|
Version 1.0 (Firmware) |
Xilinx Virtex5 FPGA | 5/15/2009 |
SHA-1     
(BYTE-only) "Firmware (FPGA) implementation providing AES (decrypt), SHA-1 and HMAC SHA-1 support." |
1011 | Broadcom Corporation 3151 Zanker Road San Jose, CA 95134 USA -Gary Goodman
-Charles Qi
|
Part # BCM5880, Version C0 |
N/A | 5/7/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SMAU Crypto/Auth contains hardware engines for AES, SHA-1/SHA-256 to support data encryption/decryption and integrity protection. The engines are used generically for crypto offload and in secure cache to protect external protected code/data caching." |
1010 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version 6.01.02 and 8.01.03 (Firmware) Part # MAXQ1959B-F50# |
Maxim MAXQ1959 | 5/7/2009 |
SHA-1     
(BYTE-only) The SHA algorithm only supports messages up to 512-bytes. "The Pitney Bowes iButton Postal Security Device (PSD) complies with FIPS 140-2 standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." 12/14/09: Update implementation information; |
1009 | Kanguru Solutions 1360 Main Street Millis, MA 02054 USA -Nate Cote
|
Version v1.0 (Firmware) Part # KN5100 v1.0 |
Kanguru KN5100 v1.0 | 4/30/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Kanguru Defender 256 is a USB Flash Drive with 256-bit AES CBC Hardware encryption. All data on the device is 100% encrypted. Additionally supports secure hashing (SHA-1, SHA-256), random number generation (ANSI X9.31-AES), digital signatures (RSA-PKCS#1_V1.5), and may be managed through Kanguru's Central Management Console via an encrypted tunnel. Processor collection includes part numbers KN5111 and KN5111A." 07/16/09: Update implementation description; |
1008 | DeltaCrypt Technologies Inc. 261A, chemin des Epinettes Piedmont, Quebec J0R 1K0 Canada -Ann Marie Colizza
-Olivier Fournier
|
Version 1.0.0.0 |
Intel Celeron w/ Microsoft Windows Server 2003; Intel Pentium 4 w/ Microsoft Windows 2000; Intel Pentium 4 w/ Microsoft Windows Vista; Intel Pentium 4 w/ Microsoft Windows XP | 4/30/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "DeltaCrypt Cryptographic Library implements the cryptographic functionalities for DeltaCrypt Encryption applications. DeltaCrypt provides sensitive data protections for computers, laptops, USB mass storage devices as well as CDs/DVDs." |
1007 | bTrade, LLC 3500 W. Olive Avenue Suite 300 Burbank, CA 91505 USA -Steve Zapata
-Clifton Gonzalves
|
Version 1.0 |
IBM POWER4 w/ IBM AIX 6.1; HP PA-7300 RISC w/ HP-UX 11.3; Sun UltraSPARC IIIi w/ SUN Solaris 10; Intel Core2 Quad w/ Microsoft Windows Vista; IBM System z9 w/ IBM z/OS 1.10; IBM POWER6 w/ IBM i 6.1 | 4/30/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The bTrade TD Solutions Security Module is a cryptographic module that provides cryptography services such as hash algorithms, encryption schemes, message authentication, and public key cryptography used by bTrade B2B and MFT products (Known as the TD Suite - TDNgine, TDAccess, TDCM, TDManager, Easy Access and CommPRESS)." 09/13/10: Add new tested OES'; |
1006 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 1.0 (Firmware) |
ARM ARM7TDMI | 4/30/2009 |
SHA-1     
(BYTE-only) "This algorithm is used by the Sun StorageTek T9840D Tape Drive." 04/24/09: Update implementation information; |
1005 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 1.0 (Firmware) |
ARM ARM7TDMI | 4/30/2009 |
SHA-1     
(BYTE-only) "This algorithm is used by the Sun StorageTek T9840D Tape Drive." 04/24/09: Update implementation information; |
1004 | Advanced Communications Concepts 8831 Capital of Tx Hwy Suite 212 n/a Austin, Texa 78759 USA -Eric Sweeney
|
Version 2.32.0.0 |
Intel Core 2 Duo w/ Windows Vista; Intel Core 2 Duo w/ Microsoft Windows 7 (64-bit edition); Intel Core 2 Duo w/ Microsoft Windows 7 (32-bit edition); Intel Core 2 Duo w/ Microsoft Windows Vista (64-bit edition) | 4/30/2009 |
SHA-512 
(BYTE-only) "TUCrypt.dll is a software only multi-chip standalone module designed to encrypt/decrypt and hash data." 01/25/10: Add new tested OES'; |
1003 | Advanced Communications Concepts 8831 Capital of Tx Hwy Suite 212 n/a Austin, Texa 78759 USA -Eric Sweeney
|
Version 2.32.0.0 |
Intel Core 2 Duo w/ Windows XP | 4/30/2009 |
SHA-512 
(BYTE-only) "TUCrypt.dll is a software only multi-chip standalone module designed to encrypt/decrypt and hash data." |
1002 | Seagate Technology, LLC. 380 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Version 1.0 (Firmware) |
Seagate Secure@ Disk Drive embedded controller: Kahu | 4/20/2009 |
SHA-256 
(BYTE-only) "Seagate leads the industry in delivering Self Encrypting Drives that are widely used by government agencies, global corporations, and small businesses for Instant Secure Erase and to secure data against theft. Seagate Secure TM Self Encrypting Drives preserve manageability and performance in systems from storage arrays to notebooks." 02/12/10: Update implementation information; |
1001 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mark D. Baushke
|
Version JUNOS 9.3R2.8 (Firmware) |
Intel Pentium III; Intel Pentium M; Intel Celeron M | 4/20/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "JUNOS-FIPS for use in M, MX & T router family." |
1000 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mark D. Baushke
|
Version JUNOS 9.3R2.8 (Firmware) |
Intel Pentium III; Intel Pentium M; Intel Celeron M | 4/20/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "JUNOS-FIPS for use in M, MX & T router family. " |
999 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mark D. Baushke
|
Version JUNOS 9.3R2.8 (Firmware) |
Intel Pentium III; Intel Pentium M; Intel Celeron M | 4/20/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "JUNOS-FIPS for use in M, MX & T router family." |
998 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mark D. Baushke
|
Version JUNOS 9.3R2.8 (Firmware) |
Intel Pentium III; Intel Pentium M; Intel Celeron M | 4/20/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "JUNOS-FIPS for use in M, MX & T router family." |
997 | eIQNetworks, Inc. 31 Nagog Park Acton, MA 01720 USA |
Version 3.1.2.2 |
Intel Pentium 4 HT w/ Windows Server 2003 | 4/20/2009 |
SHA-256 
(BYTE-only) "SecureVue module are EXEs which use wrappers around FIPS compliant OPENSSL code to provide cryptographic capabilities. Encryption, Decryption, Key Generation and Key Exchange/Communication are all done using OPENSSL code." |
996 | WinMagic Inc. 200 Matheson Blvd. West Suite 201 Mississuaga, Ontario L5R 3L7 Canada -Alexandr Mazuruc
-Garry McCracken
|
Version 4.7 |
AMD Athlon 64 w/ Microsoft Windows Vista; Intel Core 2 Duo w/ Mac OS X; Intel Pentium D w/ Microsoft Windows XP Professional | 4/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SecureDoc Cryptographic Library implements cryptographic algorithms utilized by the SecureDoc Disk Encryption products. SecureDoc software delivers full disk encryption and other data protection solutions for General Purpose Computers and laptops." 09/15/09: Add new tested OES; |
995 | Lumension Security, Inc. 15880 North Greenway Hayden Loop Scottsdale, Arizona 85260 USA -Chris Chevalier
-Dee Liebenstein
|
Version 1.0 |
Intel Pentium D w/ Microsoft Windows XP (64-bit); Intel Pentium D w/ Microsoft Windows XP (32-bit); Intel Pentium D w/ Microsoft Windows Server 2003 (64-bit); Intel Pentium D w/ Microsoft Windows Server 2003 (32-bit); Intel Xeon w/ MS Windows Server 2003 Standard x64; Intel Xeon w/ MS Windows XP Professional x64 | 4/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Lumension Security Kernel (LCK) v1.0 provides the cryptographic functionality for Lumension's application and device control products. These products use a policy-based approach to secure network endpoints from malware and unauthorized software applications, and from the malicious use of removable devices and media." 06/23/09: Add new tested OES'; |
994 | Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA 94105 USA -Amol Kabe
-Gordon Chaffee
|
Version 1.0 (Firmware) |
Intel Xeon; Intel Pentium D; AMD Opteron | 4/9/2009 |
SHA-1     
(BYTE-only) "The Riverbed Optimization System (RiOS) provides the cryptographic functionality for Riverbed's Steelhead appliances. These network appliances deliver a scalable Wide Area Data Services (WDS) solution, transparently and securely optimizing performance of network traffic and applications across an enterprise network." 04/15/09: Update vendor POC information; |
993 | Bomgar Corporation 578 Highland Colony Parkway Paragon Centre, Suite 300 Ridgeland, MS 39157 USA -Huey Ngo
-Kevin Keniston
|
Version 1.0 (Firmware) |
Intel Xeon; Intel Celeron D; Intel Core 2 Duo | 4/9/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Bomgar Box Crypto Engine provides the cryptographic functionality required by the Bomgar B200 and B300 appliances. These appliances are remote desktop access solutions, allowing support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support." 07/13/09: Add new OE; |
992 | Data Encryption Systems Limited Silver Street House Silver Street n/a Taunton, Somerset TA1 3DL United Kingdom -Julian Baycock
-Ben Lewis
|
Version 1.0 |
Intel Core2 Duo w/ Microsoft Windows XP | 4/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The DESlock+ Kernel Mode Crypto Core is a FIPS 140-2 Level 1 compliant, software-based, cryptographic module." 07/30/09: Add new tested information; |
991 | Bloombase, Inc. 955 Benecia Avenue, Sunnyvale, CA 94085 USA -Certification Team
|
Version 8.0 |
Intel Xeon w/ Bloombase Spitfire OS5 | 4/9/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Bloombase Cryptographic Module for multi-platforms is a scalable, generic and multipurpose module used by various Bloombase products, performing a broad range of cryptographic operations including encryption, digital signature, hashing and key generation, supporting services including cryptography, authentication, PKCS and key management, etc." 04/02/13: Updated vendor information; |
990 | N/A | N/A | N/A | 4/9/2009 | N/A |
989 | Motorola, Inc. 1 Motorola Plaza Holtsville, NY 11742 USA -Steven Chew
-Bert Scaramozzino
|
Version 3.00 |
ARM XScale PXA320 w/ Windows Mobile 6.1; ARM XScale PXA320 w/ Windows Mobile 6.5 | 4/9/2009 |
SHA-1     
(BYTE-only) "Motorola Wireless Fusion Cryptographic Module is a component of Motorola Wireless Mobile Computing devices that are equipped with a WLAN radio. These devices are used for business process automation applications in a number of vertical markets like retail, manufacturing, transportation, health and government." 09/15/09: Update implementation version number; |
988 | Motorola, Inc. 1 Motorola Plaza Holtsville, NY 11742 USA -Steven Chew
-Bert Scaramozzino
|
Version 3.00 |
ARM XScale PXA320 w/ Windows CE 6.0 | 4/9/2009 |
SHA-1     
(BYTE-only) "Motorola Wireless Fusion Cryptographic Module is a component of Motorola Wireless Mobile Computing devices that are equipped with a WLAN radio. These devices are used for business process automation applications in a number of vertical markets like retail, manufacturing, transportation, health and government." 09/15/09: Update implementation version number;05/05/10: Changing versioning scheme |
987 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Part # 294.005 |
N/A | 3/31/2009 |
SHA-256 
(BYTE-only) "The IronKey Secure Flash Drive includes a high-speed hardware-based 256 Bit AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, SHA-256, SHA-1, and RNG algorithms." 10/19/11: Updated vendor information; |
986 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Part # 294.006 |
N/A | 3/31/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The IronKey Secure Flash Drive includes a high-speed hardware-based 256 Bit AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, SHA-256, SHA-1, and RNG algorithms." 10/19/11: Update vendor information; |
985 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA |
Version 4.2 (Firmware) |
PowerPC 405 | 3/31/2009 |
SHA-1     
(BYTE-only) "The Thales Datacryptor encrypts and decrypts private network traffic travelling over public networks that separate authenticated Datacryptors. All Approved algorithms are implemented in a non-modifiable operating environment on a PowerPC 405 processor." |
984 | RSA Security, Inc. 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 2.1.0.6 |
AMD Athlon X2 w/ Windows Vista Ultimate (32-bit x86) | 3/31/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
983 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Doug Whiting
-Jiebing Wang
|
Part # FTB5-001A |
N/A | 3/31/2009 |
SHA-1     
(BYTE-only) "Hifn's SentryXL series Algorithm Accelerators (7964/7965/7966) are complete cryptography processors that can be used in a very wide of applications, with accelerated implementation of multiple security algorithms like TDES, AES, SHA1, MD5, etc. They can be configured to either interface with the Motorola MPC860 or MPC8260 bus, or a PCI2.2 bus." |
982 | Renesas Technology America, Inc. 450 Holger Way San Jose, CA 95134 USA -Murthy Vedula
|
Version BOS 1011 (Firmware) Part # P/N AE57C1, Version 4 |
Renesas AE57C1 | 3/31/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Renesas BOS software development framework is a mask ROM used for prototyping and mass production of embedded smart chip systems based on AE4XC/AE5XC/N2xx devices. BOS provides authentication and secure program download mechanism. Users can develop embedded applications using the BOS cryptographic, communication and OS application interfaces." |
981 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.3 |
AMD x64 w/ Ubuntu 8; AMD x64 w/ Windows Server 2003 | 3/25/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A hybrid software/hardware/firmware cryptographic module supporting encryption, authentication, and data redundancy techniques running on either Linux user or Windows kernel mode." |
980 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.0 (Firmware) Part # AC2030 |
Accelium AC2030 | 3/25/2009 |
SHA-256 
(BYTE-only) "A hybrid software/hardware/firmware cryptographic module supporting encryption, authentication, and data redundancy techniques running on either Linux user or Windows kernel mode." |
979 | Motorola, Inc. 1 Motorola Plaza Holtsville, NY 11742 USA -Steven Chew
-Bert Scaramozzino
|
Version 3.00 |
ARM XScale PXA320 w/ Windows Mobile 6.1 | 3/25/2009 |
SHA-1     
(BYTE-only) "Motorola Wireless Fusion Cryptographic Module is a component of Motorola Wireless Mobile Computing devices that are equipped with a WLAN radio. These devices are used for business process automation applications in a number of vertical markets like retail, manufacturing, transportation, health and government." 10/09/09: Update implementation version number;05/05/10: Changing versioning scheme |
978 | Marvell Semiconductor, Inc. 5488 Marvell Lane Santa Clara, CA 95054 USA -Lei Poo
-Fred Au
|
Version 1.5_wtm_morona_032009_00 (Firmware) |
NCVerilog 5.5 simulation environment | 3/25/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "A compact Hash engine supporting the SHA-1, SHA-224 and SHA-256 standards. For HMAC operations, key length of up to 512 bits is supported. Configuration, control and status checking are done through the popular APB interface. A simple FIFO-like interface is employed for data input/output." |
977 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Ryon Coleman
-Chaoxing Lin
|
Part # 1.0 |
N/A | 3/25/2009 |
SHA-1     
(BYTE-only) "Intel Crypto Algorithms running on XScale hardware for accelerated performance." |
976 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Ryon Coleman
-Chaoxing Lin
|
Version 0.9.7-beta3 (Firmware) |
Intel XScale | 3/25/2009 |
SHA-1     
(BYTE-only) "Algorithms listed are used to provide encryption and authentication services within 3eTI networking products." |
975 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Ryon Coleman
-Chaoxing Lin
|
Version 1.0 (Firmware) |
Intel XScale | 3/25/2009 |
SHA-1     
(BYTE-only) "Algorithms listed are used to encrypt and hash data packets in kernel space." 03/31/09: Update implementation information; |
974 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 88007021F, vFUP2 v1.46 |
N/A | 3/12/2009 |
SHA-1     
(BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
973 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 88007021F, v03.00.04 |
N/A | 3/12/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technolgoy commercially available for protection of user data files." |
972 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 88007021F, v03.00.04 |
N/A | 3/12/2009 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra PC Locksmith is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
971 | Texas Instruments 6550 Chase Oaks Blvd Plano, Texas 75023 USA -Jack Gregory
|
Version REL_ENIGMA_ALG01 (Firmware) |
Maxim MAXQ | 3/12/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SHA-1 and SHA-256" |
970 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Sakthi Subramanian
|
Version 1.1.2.2 |
RMI MIPSXLR w/ Linux/MIPS | 3/6/2009 |
SHA-1     
(BYTE-only) "The McAfee Network Security portfolio of purpose-built appliances delivers cost-effective, comprehensive and proactive network and system security with multi-gigabit performance for locations from branch offices to the network core." |
969 | N/A | N/A | N/A | 3/6/2009 | N/A |
968 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
|
Version 7.2.4.18 and 7.2.4.30 (Firmware) |
AMD Geode; Intel Pentium 4; Intel Celeron | 3/6/2009 |
SHA-1     
(BYTE-only) "The market-leading Cisco ASA security appliances deliver robust user and application policy enforcement and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco ASA security appliances provide comprehensive security, performance, and reliability for network environments of all sizes." 05/07/09: Tested with new version number; |
967 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(18a)JA (Firmware) |
Freescale MPC8349E | 3/6/2009 |
SHA-1     
(BYTE-only) This implementation does not support the null message for SHA-1 "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
966 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(18a)JA (Firmware) |
AMCC 405EX | 3/6/2009 |
SHA-1     
(BYTE-only) This implementation does not support the null message for SHA-1 "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
965 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 12.4(18a)JA (Firmware) |
IBM PPC405EP | 3/6/2009 |
SHA-1     
(BYTE-only) This implementation does not support the null message for SHA-1 "The Cisco Aironet Access Points deliver the versatility, high capacity and enterprise-class features required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and AES for WPA2 encryption." |
964 | IBM Corporation 11400 Burnet Road Austin, TX 78758 USA -Kevin Driver
|
Version 1.3.1 |
Intel Pentium 4 w/ Windows XP Professional SP2 with IBM JVM 1.6.0 | 3/6/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for Multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework that is part of all JVM's at the 1.4.0 level and higher." |
963 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version R01.00.00 (Firmware) Part # 5185912Y01 |
Motorola Advanced Crypto Engine Processor | 3/6/2009 |
SHA-384 
(BYTE-only) "The MACE cryptographic processor is used in the Motorola CryptR Broadband IP Encryption unit which is a high-quality IPSec Virtual Private Network (VPN) gateway solution that enables end-to-end secure communications across mobile, fixed, and multi-hop broadband networks." |
962 | Redline Communications, Inc. 302 Town Centre Blvd., 4th Floor Markham, Ontario L3R OE8 Canada -Leigh Chang
-Lee Lipes
|
Version 1.0 (Firmware) |
Intel IXP420 w WindRiver VxWorks 6.5 | 2/19/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This is a firmware library that provides the cryptographic functions used on Redline's industry leading reliable, secure and high performance broadband wireless products." 03/12/09: Update implementation information; |
961 | Harris Corporation (RF Communications Division) 1680 University Avenue Rochester, New York 14610 USA -Elias Theodorou
|
Version 1.0 (Firmware) |
Intel IXP420 w/ WindRiver VxWorks 6.5 | 2/19/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This is a firmware library that provides the cryptographic functions used on Harris' industry leading reliable, secure and high performance broadband Ethernet radio products." 03/12/09: Update implementation information; |
960 | nCipher Corporation Ltd. Jupiter House Station Road n/a Cambridge, CB1 2HD United Kingdom -Marcus Streets
-Mark Wooding
|
Version 7.0 (Firmware) |
Motorola Power PC running a proprietary Operating System | 2/13/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's nShield Hardware Security Modules." |
959 | Tropos Networks 555 Del Rey Ave. Sunnyvale, CA 94085 USA -Mukesh Gupta
|
Version OpenSSL_0.9.8j_FIPS_1.2 (Firmware) |
AMD X86 SC1100 with AR5213 chipset; AMCC Power PC 440EP with AR5213 chipset; AMCC Power PC 440EP with AR9160 chipset | 2/13/2009 |
SHA-1     
(BYTE-only) "Tropos's single/multi-radio, wireless 802.11 a/b/g/n MetroMesh routers provide a secure, high-performance, easy to deploy, and cost-effective networking solution for outdoor environments. Tropos routers support IEEE 802.1X and 802.11i with AES encryption and secure EAP types while operating in FIPS 140-2 mode." |
958 | Tropos Networks 555 Del Rey Ave. Sunnyvale, CA 94085 USA -Mukesh Gupta
|
Version CRYPTO_LIB_1.0 (Firmware) |
AMD X86 SC1100 with AR5213 chipset; AMCC Power PC 440EP with AR5213 chipset; AMCC Power PC 440EP with AR9160 chipset | 2/13/2009 |
SHA-1     
(BYTE-only) "Tropos's single/multi-radio, wireless 802.11 a/b/g/n MetroMesh routers provide a secure, high-performance, easy to deploy, and cost-effective networking solution for outdoor environments. Tropos routers support IEEE 802.1X and 802.11i with AES encryption and secure EAP types while operating in FIPS 140-2 mode." |
957 | Lexar 3060 N. First Street San Jose, CA 95134 USA -Mehdi Asnaashari
|
Version XX (Firmware) Part # Version AB |
Intel Core 2 | 2/5/2009 |
SHA-256 
(BYTE-only) "Lexar SHA-256 Module is a subcomponent of Lexar Secure Storage Controller." |
956 | Maxim Integrated Products 120 San Gabriel Dr. Sunnyvale, CA 94086 USA -Kris Ardis
|
Version 1.0 (Firmware) Part # MAXQ |
MAXQ | 2/5/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SHA-1, SHA-224, SHA-256 supported by hardware on the MAXQ. Other lengths implemented in software." |
955 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Clint Winebrenner
|
Version 5.2.2 (Firmware) |
TI OMAP 1710 | 2/5/2009 |
SHA-1     
(BYTE-only) "The RSA library is responsible for the mechanics of the call. For instance it sets up and tears down the tunnel used for the call, as well as the signaling channel, and TLS session to the call manager. All non-voice stream data is protected by the RSA library." |
954 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Clint Winebrenner
|
Version 1.3.20 (Firmware) |
TI OMAP 1710 | 2/5/2009 |
SHA-1     
(BYTE-only) "libSRTP is the crypto engine responsible for the point to point encryption of the voice stream in a call made by the 7921/7925 phones." |
953 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
-Jorma Levomäki
|
Version 4.2.2.5708.cc3.1 (Firmware) |
Intel Celeron | 2/5/2009 |
SHA-1     
(BYTE-only) "A part of the StoneGate Firewall/VPN Appliance firmware that includes the StoneGate Firewall/VPN software and the SafeNet QuickSec Toolkit." |
952 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA |
Version 1.0 |
AMD Opteron w/ Red Hat Enterprise Linux Version 5.0 | 2/5/2009 |
SHA-1     
(BYTE-only) "Network and Security Manager (NSM) is a centralized management solution that controls the entire device life cycle of firewall/IPSec VPN and IDP devices. The NSM Cryptographic Module provides cryptographic services to the NSM solution." |
951 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA |
Version 1.0 |
AMD Opteron w/ Red Hat Enterprise Linux Version 5.0 | 2/5/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network and Security Manager (NSM) is a centralized management solution that controls the entire device life cycle of firewall/IPSec VPN and IDP devices. The NSM Cryptographic Module provides cryptographic services to the NSM solution." |
950 | Vocera Communications, Inc. 525 Race Street San Jose, CA 95126 USA -Thirumalai Bhattar
-Arun Mirchandani
|
Version 1.0 |
Texas Instruments OMAP5912 w/ Vocera Embedded Linux, Version 1.0 | 2/5/2009 |
SHA-1     
(BYTE-only) "The Wireless Communications Crypto Library provides cryptographic services to Vocera's B2000 Communications badge product.The Vocera B2000 communications badge is a wearable device that enables secure two-way voice conversation without the need to remember a phone number or use a handset." 03/16/10: Update implementation information; |
949 | Oberthur Technologies 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version 0801 (Firmware) Part # C3 |
ID-One Cosmo v7.0 A | 2/5/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The ID-One Cosmo Smart Card Platform is a single chip multi-application cryptographic module that offers a highly secure architecture together with enhanced cryptographic services. The tested algorithm implementation applies to the following hardware part number: BF, CO, C3, CF, with firmware version 0801." |
948 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Mike Soto
|
Version Modular IOS 12.2(33)SXI (Firmware) |
PMC-Sierra RM7000 RISC | 2/5/2009 |
SHA-1     
(BYTE-only) "The Cisco IPSec VPN Services Port Adapter delivers cost-effective VPN performance for Cisco Catalyst 6500 Series switches. " |
947 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Mike Soto
|
Version IOS 12.2(33)SXI (Firmware) |
PMC-Sierra RM7000 RISC | 2/5/2009 |
SHA-1     
(BYTE-only) "The Cisco IPSec VPN Services Port Adapter delivers cost-effective VPN performance for Cisco Catalyst 6500 Series switches. " |
946 | IBM 2455 South Road Poughkeepsie, NY 12601-5400 USA -William Penny
|
Part # FC 3863, Version 1.0 |
N/A | 1/15/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM zSeries CP Assist feature provides processor-integrated hardware acceleration for TDES, AES, and SHA variants." |
945 | Midland Radio Corporation 5900 Parretta Drive Kansas City, Missouri 64120 United States -Dave Berneking
|
Version 1.0 (Firmware) |
TI TMS320VC5509A DSP | 1/15/2009 |
SHA-256 
(BYTE-only) "Implemented on a TI TMS320VC5509A DSP in firmware under the control of a Hitachi H8 Host Processor. No Operating System is used. The Algorithms are used on Midland BTIII Base Stations provide encrypted and clear voice, data and Short Message Service communications in accordance with the Project 25 standard." |
944 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -William McIntosh
|
Version 4.1.1 Build 4278X |
Intel Celeron M w/ Windows XP Professional with SP2; Intel Celeron M w/ Windows 2000 Professional with SP4; AMD Athlon X2 w/ Windows Vista Ultimate Edition; Intel Pentium 4 w/ Windows Server 2003 SP2 | 1/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FTI Driver is apart of the Fortress Secure Client designed to deliver security on wireless devices such as bar scanners, handhelds, and laptops using various operating systems. A plug-and-play solution, the Client encrypts and decrypts communication across the WLAN and protects the device against attacks without user intervention." |
943 | Secure Computing Corporation 12010 Sunset Hills Road, Suite 300 Reston, VA 20190 USA -Mark Hanson
-Jason Lamar
|
Version 7.0.1.01 (Firmware) |
Intel Xeon; Intel Pentium; Intel Core i3; Intel Atom | 1/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Library for SecureOS is a library for software providing cryptographic services for applications on versions of Sidewinder Security Appliance and Sidewinder G2 Enterprise Manager." 03/12/09: Update implementation information; |
942 | Secure Computing Corporation 12010 Sunset Hills Road, Suite 300 Reston, VA 20190 USA -Mark Hanson
-Jason Lamar
|
Version 7.0.1.01 (Firmware) |
Intel Xeon; Intel Pentium; Intel Core i3; Intel Atom | 1/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Library for SecureOS is a library for software providing cryptographic services for applications on versions of Sidewinder Security Appliance and Sidewinder G2 Enterprise Manager." 03/12/09: Update implementation information; |
941 | Secure Computing Corporation 12010 Sunset Hills Road, Suite 300 Reston, VA 20190 USA -Mark Hanson
-Jason Lamar
|
Version 7.0.1.01 (Firmware) |
Intel Xeon; Intel Pentium; Intel Core i3; Intel Atom | 1/15/2009 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Library for SecureOS is a library for software providing cryptographic services for applications on versions of Sidewinder Security Appliance and Sidewinder G2 Enterprise Manager." 03/12/09: Update implementation information; |
940 | N/A | N/A | N/A | 1/8/2009 | N/A |
939 | N/A | N/A | N/A | 1/7/2009 | N/A |
938 | Asigra, Inc. 1120 Finch Avenue West, Suite 400 Toronto, ON M3J 3H7 Canada -Andrei Litvin
|
Version 1.0 |
Intel Core Duo w/ MAC OSX 10.5; Intel Pentium 4 w/ Linux Red Hat Enterprise 5.0 x86; Intel Pentium 4 HT w/ Linux Red Hat Enterprise 5.0 x64; Intel Pentium 4 HT w/ Microsoft Windows Server 2003 x64; Intel Pentium D w/ Microsoft Windows XP; Intel Pentium 4 w/ Windows Server 2003 x86 | 1/8/2009 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AsigraEncModule Encryption Library is a cryptographic library called by C++ programs that provides AES encryption/decryption, hashing, and random number generation." 11/18/09: Add new tested OES and update implementation information; |
937 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 1.0 (Firmware) |
ARM926EJ | 12/24/2008 |
SHA-1     
(BYTE-only) "The Sun T10000 tape drives use SHA-1 as part of TLS1.0." |
936 | Secure64 Software Corporation 5600 South Quebec Street Suite 320D Greenwood Village, CO 80111 USA |
Version 1.0 |
Itanium w/ Limitied Operating Environment | 12/24/2008 |
SHA-256 
(BYTE-only) "Secure64 Crypto Module" |
935 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
|
Version 8.0.4.16 and 8.0.4.28 (Firmware) |
Intel Celeron; Intel Pentium 4; AMD Geode | 12/24/2008 |
SHA-1     
(BYTE-only) "The market-leading Cisco ASA security appliances deliver robust user and application policy enforcement and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco ASA security appliances provide comprehensive security, performance, and reliability for network environments of all sizes." 06/22/09: Update new tested version; |
934 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoff Waters
|
Freescale Semiconductor MPC8572E | 12/18/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Freescale's MDEU r3.0.0 is an algorithm specific accelerator for secure hashing algorithms supporting the NIST modes and hash lengths listed above. This revision of the MDEU is used in multiple versions of the SEC (Freescale's Embedded Security Acceleration Engine)." |
|
933 | Freescale Semiconductor, Inc. 7700 West Parmer Lane Austin, TX 78729 USA -Geoff Waters
|
Freescale Semiconductor MPC8548E | 12/18/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) ""Freescale's MDEU r2.1.2 is an algorithm specific accelerator for secure hashing algorithms and HMACs supporting the NIST modes, hash lengths, and key lengths listed above. This revision of the MDEU is used in multiple versions of the SEC (Freescale's Embedded Security Acceleration Engine)." |
|
932 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version QuickSec SSH 2.0 (Firmware) |
Motorola MPC8540 PowerQUICC III | 12/18/2008 |
SHA-1     
(BYTE-only) "Cisco Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture." |
931 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 0.9.8g (Firmware) |
Motorola MPC8540 PowerQUICC III | 12/18/2008 |
SHA-1     
(BYTE-only) "Cisco Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture." |
930 | SECUDE AG Bergegg Emmetten, NW, CH-6376 Switzerland -Ronnie Wang
|
Version 1.0 |
Intel Core 2 Duo w/ Customized Linux with Kernel 2.6.23; Intel Core 2 Duo w/ Windows Vista; Intel Core 2 Duo w/ Windows XP; Intel Core 2 Duo w/ Windows 7 (Professional or Enterprise Editions) | 12/18/2008 |
SHA-1     
(BYTE-only) "FSE Crypto-Lib is a SECUDE developed, open source cryptographic library integrated module dedicated to providing core services including key generation, hashing, HMAC and symmetric and asymmetric encryption/decryption, for the FinallySecure Enterprise software." 12/23/09: Add new tested OES; |
929 | Secure64 Software Corporation 5600 South Quebec Street Suite 320D Greenwood Village, CO 80111 USA |
Version 1.0 |
Itanium w/ Limitied Operating Environment | 12/12/2008 |
SHA-1     
(BYTE-only) "Secure64 Crypto Module" |
928 | Etherstack Inc. Floor 6E 145 W 27th Street n/a New York, NY 10001 USA -Paul Richards
|
Version ES0408_RL02_R1_00_000 (Firmware) |
Atmel AT91SAM7S256 | 12/12/2008 |
SHA-1     
(BYTE-only) "Nexus Wireless FIPS 140-2 P25 Crypto Module" |
927 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.12.0 FC6 |
Dell PowerEdge 860 with Dual Core Xeon 3060 w/ Linux, 32 bit Fedora Core 6 | 12/12/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products. " |
926 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.12.0 WIN 32 |
Dell PowerEdge 860 with Dual Core Xeon 3060 w/ Windows XP Professional 2002 SP-2 | 12/12/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." |
925 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.12.0 OSX |
Intel Core 2 Duo 2.33 GHz w/ Mac OS X 10.5 Apple MacBook Pro 15" | 12/12/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products. " |
924 | TAC, LLC 1 High Street North Andover, MA 01845 USA -Richard Dubois
|
Version ACX2 v1.100021; NC2 v2.100021 (Firmware) Part # ACX2 Rev 2a, NC2 Rev B |
Motorola Coldfire MCF5275 | 12/12/2008 |
SHA-1     
(BYTE-only) "The Continuum Network Security Module is a hardware module developed by TAC, LLC. The ACX2 and NC2 series of Controllers provide services for building automation in the areas of HVAC, Lighting, and Physical Access Security. The controller series maintains a set of building automation objects in an internal database as configured through a Cybers" 11/04/09: Update implementation information; |
923 | Secure64 Software Corporation 5600 South Quebec Street Suite 320D Greenwood Village, CO 80111 USA -Christopher Worley
|
Version 1.0 |
Intel Itanium Processor w/ Secure64's Source T Operating System | 12/12/2008 |
SHA-1     
(BYTE-only) "The Secure64 Cryptographic Module provides cryptographic services to Secure64 components and applications running on Secure64's SourceT operating system. The cryptographic module is statically linked with the SourceT OS and Secure64 application software by Secure64 to deliver FIPS 140-2 compliant products." |
922 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.7 (Firmware) |
Qualcomm MSM7600 processor with BlackBerry OS 4.7 | 12/12/2008 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
921 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.51 (Firmware) |
Qualcomm MSM7600 processor with BlackBerry OS 4.7 | 12/12/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
920 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Mike Soto
|
Part # 2.0 |
N/A | 12/12/2008 |
SHA-1     
(BYTE-only) "Hardware acceleration used on the Cisco HMARC products." |
919 | Raytheon Oakley Systems, Inc. 2755 E. Cottonwood Parkway, Suite 600 Salt Lake City, UT 84121 USA -Mindy Gilbert
-Morgan Greenwood
|
Version 1.0 |
Intel Xeon w/ Red Hat Enterprise Linux v4 | 11/26/2008 |
SHA-1     
(BYTE-only) "The Raytheon Oakley Systems FIPS Linux Cryptographic Module is a software module providing cryptographic functionality for the Raytheon Oakley Systems InnerView insider threat product. InnerView is an enterprise monitoring, threat detection, and policy enforcement solution." |
918 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.6.8 (Firmware) |
Strong Arm II (80219) | 11/26/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware and associated co-processor." |
917 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.6.8 (Firmware) |
StrongArm II (80200) | 11/26/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna PCM/CA4 offer dedicated hardware key management to protect sensitive cryptographic keys from attack. Digital sign/verifiy operations are performed in the HSM to increase performance and maintain security. Cryptographic keys are backed up by a FIPS approved algorithm and can be stored in software or replicated on one or more CA4 tokens." |
916 | Midland Radio Corporation 5900 Parretta Drive Kansas City, Missouri 64120 United States -David Kingsolver
|
Version 1.0 (Firmware) |
Texas Instruments C54 DSP Processor | 11/26/2008 |
SHA-256 
(BYTE-only) "Implemented on a TI C54 DSP in firmware under the control of a Renesas M16C62 Host Processor. No Operating System is used. The algorithms are used on Midland Mobile, Trunk, Portable and Desk mount radio products to provide encrypted voice, data and short message services compatible with the P25 Standard." |
915 | ST Electronics (Info-Security) Pte Ltd 100 Jurong East Street 21 ST Electronics Jurong East Building n/a n/a, 609602 Singapore -Yeo Boon Hui
|
Version 1.0.0 (Firmware) |
Marvell XScale PXA300 | 11/26/2008 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "DigiSAFE TrustCrypt is a programmable cryptographic module designed to support high assurance applications and provide secure cryptographic resources, including secure key generation and storage. It is built upon a secure physical enclosure and contains a secure bootstrap which authenticates application loading." |
914 | SkyRecon Systems 8 rue La Fayette Paris, France 75009 France -Charles LE
|
Version 1.0 |
DELL Dimension E520 with Processeur Intel Core 2 6300 (1.8GHz) w/ Windows XP Professional SP3 | 11/26/2008 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "SkyRecon Cryptographic Module (SCM) is a software-based cryptographic library. SCM encapsulates several cryptographic algorithms to perform encryption and decryption with AES, hashing with SHA 512 and random number generation. SCM static library is written in C language." |
913 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.6.1 (Firmware) |
FreeScale Argon LV processor with BlackBerry OS 4.6.1 | 11/26/2008 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." 12/01/08: Correction for OE version number; |
912 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Constance Christodulis
-Ray Savarda
|
Part # 8450 |
N/A | 11/26/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Hifn 8450 is a flowthru system on a chip implementation of IPsec, SRTP and MACsec. This family of security processors allows easy integration of complete bump-in-the-wire security into any product requiring the supported security functions, and includes on-chip IKE." |
911 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Constance Christodulis
-Ray Savarda
|
Part # 4450 |
N/A | 11/26/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Hifn 4450 is a flowthru system on a chip implementation of IPsec, SRTP and MACsec. This family of security processors allows easy integration of complete bump-in-the-wire security into any product requiring the supported security functions, and includes on-chip IKE." |
910 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 3.2 (Firmware) |
Intel Celeron; Intel Celeron M; Intel Pentium III; Intel Pentium 4; Intel Xeon | 11/26/2008 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet SSL Cryptographic Library v3.2 runs on an Intel x86 compatible processor using the FortiOS. " |
909 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Langley Rock
|
Version 3.2 (Firmware) |
Intel Celeron; Intel Celeron M; Intel Pentium III; Intel Pentium 4; Intel Xeon | 11/26/2008 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FIPS Cryptographic Library v3.2 runs on an Intel x86 compatible processor using the FortiOS." |
908 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 2.07.00 (Firmware) |
Intel 80321 (ARM V5T) | 11/26/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeNet PSG Firmware provides a wide range of cryptographic functions." |
907 | Mobile Armor, Inc. 400 South Mills Wood Rd Suite 300 Chesterfield, MO 63017 USA -Brian E. Wood
|
Version 3.5 |
Intel Pentium 4 w/ Windows XP Professional w/ SP2; Intel Penium 4 w/ Windows Server 2003 w/ SP1; Intel Pentium 4 w/ Windows Server 2000 w/ SP3; AMD Opteron w/ Red Hat Enterprise Linux v5.0 (64-bit binary); AMD Opteron w/ Red Hat Enterprise Linux v5.0 (32-bit binary); AMD Opteron w/ SuSE Linux Enterprise Server 10 (64-bit binary); AMD Opteron w/ SuSE Linux Enterprise Server 10 (32-bit binary) | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The module is a software component which is compiled from a single set of source code. The module itself is designed to provide encryption, decryption, HMAC and hash functions and a RNG. The module is designed for evaluation at FIPS 140-2 Level 2" |
906 | IBM Corporation 9032 S Rita Road Tucson, AZ 85744 USA -David L. Swanson
-Christine Knibloe
|
Version 1.0 (Firmware) |
Renesas SH7780 | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "This implementation adds secure key channel capabilites to the IBM LTO Ultrium 4 Tape Drive" |
905 | Secuware Torre Picasso Plaza Pablo Ruiz Picasso, s/n. n/a Madrid, Spain 28020 Spain -Jorge López Hernández-Ardieta
|
Version 4.0 |
Intel Core 2 Duo w/ Windows XP professional SP2 | 11/14/2008 |
SHA-1     
(BYTE-only) "The SCM is a function library implementing crypto services which is delivered to the final user as a SW cryptographic object Module, running on Windows operating system in a General Purpose Computer. " |
904 | EFJohnson Technologies 1440 Corporate Drive Irving, TX 75038-2401 USA -John Oblak
|
Version 2.0 (Firmware) |
TMS320C6454 | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "This is the EF Johnson implementation of the SHA1, SHA256, and SHA512 algorithms. These algorithms are used in the EF Johnson infrastructure components and KMF, which use the FIPS 140-2 certified JEM2 module." |
903 | General Dynamics Canada Ltd. 1020 - 68th Avenue NE Calgary, Alberta T2E 8P2 Canada -Matthew Hill
-Tim Smith
|
Version 1 (Firmware) |
Vertex II Pro | 11/14/2008 |
SHA-1     
(BYTE-only) "SHA-1 crypto algorithm for the Meshnet family of products including the TNG. This algorithm is implemented on the TNG ST firmware." |
902 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.50a (Firmware) |
FreeScale Argon LV processor with BlackBerry OS 4.6.1; Marvell PXA 270 processor with BlackBerry OS 4.6 | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." 02/18/09: Update new tested OE; |
901 | Etherstack Inc. Floor 6E 145 W 27th Street n/a New York, NY 10001 USA |
Version ES0408_RL01_R1_00_000 (Firmware) |
ARM7TDMI | 11/14/2008 |
SHA-1     
(BYTE-only) "Nexus Wireless FIPS 140-2 P25 Crypto Module" 03/15/13: Updated implementation information; |
900 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 5.2.6 (Firmware) |
Strong Arm II (80219) | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna® PCI for Luna IS offers hardware-based key management and cryptographic operations to protect sensitive keys. All cryptographic algorithms are implemented within the module's firmware." |
899 | AudioCodes 1 Hayarden St. Airport St., Lod 70151 Israel -Yair Elharrar
|
Version 4.7.1.5 |
Freescale (MPC8xx/MPC82xx) processor w/ pSOS+ 2.5 | 11/14/2008 |
SHA-1     
(BYTE-only) "Voice-over-IP media gateway" |
898 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 5.2.5 (Firmware) |
Strong Arm II (80219) | 11/14/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna® PCI for Luna IS offers hardware-based key management and cryptographic operations to protect sensitive keys. All cryptographic algorithms are implemented within the module's firmware." |
897 | Cryptek Inc. 1501-A Moran Road Sterling, VA 20166-9309 USA -Michael Teal
|
Version 1.0.0.5 (Firmware) |
DragonBall MC9328MX1VM20 | 11/4/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Netgard CSM is a managed high performance security platform designed to deliver over 400 Mbps full-duplex throughput, supports strong encryption utilizing IPSec, port/protocol filtering, MAC/DAC access controls and security auditing. The CSM is found in all Cryptek Netgard hardware endpoint devices." |
896 | Cryptek Inc. 1501-A Moran Road Sterling, VA 20166-9309 USA -Michael Teal
|
Part # 8570A31890, Rev. A |
N/A | 11/4/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Netgard CSM is a managed high performance security platform designed to deliver over 400 Mbps full-duplex throughput, supports strong encryption utilizing IPSec, port/protocol filtering, MAC/DAC access controls and security auditing. The CSM is found in all Cryptek Netgard hardware endpoint devices." |
895 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Brian Mansfield
|
Version 4.1.185.10 (Firmware) |
IBM 405GP PowerPC | 11/4/2008 |
SHA-1     
(BYTE-only) "The Cisco LWAPP Aironet 1131, 1242 access points deliver the versatility, high capacity, security, and enterprise-class features required for small, medium and large Government deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and Advanced Encryption Standard (AES) for WPA2 encryption." |
894 | Meru Networks 894 Ross Drive Sunnyvale, CA 94089 USA -Joe Epstein
|
Version 1.0 |
Cavium Networks Octeon w/ Linux 2.6.21 | 11/4/2008 |
SHA-1     
(BYTE-only) "Meru Networks Security Gateway is a high performance security solution for wireless data/voice traffic. The Security Gateway supports 802.1x(EAP-TLS) and IEEE 802.11i standards providing authentication, data confidentiality and integrity. The Cryptographic Engine implements RSA, AES-CCMP, TDES, HMAC-SHA1 and RNG algorithms." |
893 | BULL S.A.S. Rue Jean Jaurès Les Clayes sous Bois, 78340 France -Jean-Luc CHARDON
-Pierre-Jean AUBOURG
|
Version V1.02-00L (Firmware) |
Freescale MPC8248 | 10/27/2008 |
SHA-256 
(BYTE-only) "Bull implements this algorithm for applications running on its CHR hardware platform providing secure cryptographic resources to products developed by Bull or other Application Providers, including the CRYPT2Pay HR product line." |
892 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 1.0 (Firmware) |
Atheros AR5312; IDT79RC3234; Cavium Networks Octeon Plus CN5010 | 10/27/2008 |
SHA-1     
(BYTE-only) "Aruba's single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
891 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 3.3.2.0 (Firmware) |
Cavium Networks Octeon Plus CN5010 | 10/16/2008 |
SHA-1     
(BYTE-only) "Aruba's single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
890 | Check Point Software Technologies Ltd. 5 Choke Cherry Road Rockville, MD 20850 USA -Malcolm Levy
|
Version VPN-1 R65 |
Dual Processor AMD-Opteron® Single Core w/ Check Point SecurePlatform; Dual Processor Intel® Pentium® 4 Xeon w/ Check Point SecurePlatform | 10/16/2008 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 version R65 is a tightly integrated software solution combining the FireWall-1 (FW-1) security suite with sophisticated Virtual Private Network (VPN) technologies and a hardened SecurePlatform operating system (OS)." |
889 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551 Min-Tsu Road SEC.5 Yang-Mei, Taoyuan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 1.0 (Firmware) |
Renesas AE57C1 | 10/16/2008 |
SHA-1     
(BYTE-only) "HiKey Cryptographic Library supports AES, Triple-DES, HMAC-SHA1, SHA-1, RSA and FIPS 186-2 RNG Implementations for the HiKey PKI token and HiKey flash products." |
888 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 3.3.2.0 (Firmware) |
Atheros AR5312; IDT79RC3234 | 10/16/2008 |
SHA-1     
(BYTE-only) "Aruba's single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
887 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 3.3.2.0 (Firmware) |
Atheros AR5312; IDT79RC3234 | 10/16/2008 |
SHA-1     
(BYTE-only) "Aruba's single/multi-radio wireless 802.11 a/b/g/n APs are featured to address the needs of secure, mobile networks of all sizes. They may be configured for enterprise and/or Mesh topologies, or to provide secure remote connectivity across high latency links. Aruba APs support the IEEE 802.1X and 802.11i standards with up to 256-bit AES encryption." |
886 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Mike Siegel
|
Version 5.1.6 |
Intel Pentium 4 2.4GHz w/ Windows XP Professional; x86 Family 6 Model 8 Stepping 10 w/ Windows 2000 Professional; Intel Core 2 Duo CPU w/ Windows Vista 32; AMD Turion 64 X2 Mobile Technology TL-56 1.79 GHz w/ Windows Vista 64 | 10/16/2008 |
SHA-1     
(BYTE-only) "McAfee Endpoint Encryption for PC is a high performance software solution that provides sector-level encryption of a PC's hard drive in a manner that is totally transparent to the user. In addition, the centralized McAfee Endpoint Encryption management system provides robust recovery tools, administration, and implementation." 12/11/08: Add new tested OES'; |
885 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Mike Siegel
|
Version 2.3.0.5 |
Samsung SC32442 w/ Windows Mobile 5 | 10/16/2008 |
SHA-1     
(BYTE-only) "McAfee Endpoint Encryption for Mobile is a security system for smart phones and pocket PCs that prevents the data stored on such devices from being read or used by an unauthorized person. In simple terms, McAfee Endpoint Encryption for Mobile takes control of a user's data away from the operating system." 12/11/08: Update version number; |
884 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Mike Siegel
|
Version 3.1.1.7 |
Intel Pentium 4 2.4GHz w/ Microsoft Windows XP Professional; x86 Family 6 Model 8 Stepping 10 w/ Windows 2000 Professional; Intel Core 2 Duo CPU w/ Windows Vista 32; AMD Turion 64 X2 Mobile Technology TL-56 1.79 GHz w/ Windows Vista 64 | 10/16/2008 |
SHA-1     
(BYTE-only) "McAfee Endpoint Encryption for Files and Folders encrypts folders and files according to policies set by administrators. It acts like a filter between the application accessing the files and the storage media. The encryption/decryption process happens automatically and is fully transparent." 12/11/08: Update version number and add new tested OES'; |
883 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeff Ward
|
Version NGX (R65) HFA-02 |
Intel® Celeron® M w/ IPSO v4.2; Intel® Core 2 Xeon™ Quad Core w/ IPSO v4.2; Intel® Pentium® 4 Xeon™ w/ IPSO v4.2; Intel® Pentium® III Celeron® w/ IPSO v4.2; Intel® Core Xeon™ LV Dual Core w/ IPSO v4.2 | 10/16/2008 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 module running on Nokia's IPSO security hardened operating system." |
882 | Sony Corporation 1-7-1 Konan, Minato-ku Tokyo, 108-0075 Japan -Akifumi Mishima
|
Version 1.00 (Firmware) |
NIOS2 (Altera Stratix II FPGA) | 10/27/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Sony Security Module is a multi-chip embedded cryptographic module that is encapsulated in a hard opaque potting material. The cryptographic boundary is defined as the entire epoxy perimeter, encapsulating all hardware, software, and firmware within." |
881 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
-Mike Soto
|
Version 12.4(15)T7 (Firmware) |
PowerQuicc III - MPC8541E | 10/16/2008 |
SHA-1     
(BYTE-only) "Cisco IOS Software, the industry-leading and most widely deployed network system software, delivers intelligent network services on a flexible networking infrastructure that enables the rapid deployment of Internet applications." |
880 | Nationz Technologies Inc. 11F/12F, Tower Building #3 China Academy of Science and Technology Development Gaoxin South Rd. 1 Nanshan District, High-tech Industrial Area Shenzhen, Guangdong 518057 P.R.China -Peng Bo
-Zhang Yiwei
|
Version V1.0 (Firmware) |
Dedicated 32-bit secure RISC processor | 10/16/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Z32L256D32U Cryptographic Library provides RSA, SHA, RNG and TDES cryptographic service. The library is based on Nationz Z32L256D32U SmartCard IC for high-end USB key market, which has high performance, high security, low power consumption and low cost targeting for great capability USB key, desktop encrypting machine, desktop VPN etc." 03/06/09: Update vendor information; |
879 | Nationz Technologies Inc. 11F/12F, Tower Building #3 China Academy of Science and Technology Development Gaoxin South Rd. 1 Nanshan District, High-tech Industrial Area Shenzhen, Guangdong 518057 P.R.China -Peng Bo
-Zhang Yiwei
|
Version 1.0 (Firmware) |
Zi8051-Secure Core | 10/16/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Z8D168 Cryptographic Library based on Nationz Z8D168 SmartCard IC is a single-chip firmware module providing RSA, TDES, AES, RNG cryptographic service for government and corporate identification, payment, banking and Web applications etc." 03/06/09: Update vendor information; |
878 | Nationz Technologies Inc. 11F/12F, Tower Building #3 China Academy of Science and Technology Development Gaoxin South Rd. 1 Nanshan District, High-tech Industrial Area Shenzhen, Guangdong 518057 P.R.China -Peng Bo
-Zhang Yiwei
|
Version V1.0 (Firmware) |
Zi8051-Secure Core | 10/16/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Z8D64U Cryptographic Library based on Nationz Z8D64U SmartCard IC is a single-chip firmware module providing RSA cryptographic service for government and corporate identification, payment, banking and Web applications etc." 03/06/09: Update vendor information; |
877 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.6 (Firmware) |
Intel PXA930 624MHz processor with BlackBerry OS 4.6 | 10/7/2008 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
876 | Virtual Mobile Technologies (Pty) Ltd Unit 5 The Planet Art 32 Jamieson Street Cape Town, Western Cape 8001 South Africa -Carl Meijer
|
Version 2.0 |
Java ME (J2ME) w/ Sony-Ericsson W380 mobile phone | 10/7/2008 |
SHA-1     
(BYTE-only) "VMT's cryptographic library supports random number generation, key transport/wrapping, encryption and authentication. The library is part of a broader SOA integration solution that provides end-to-end web services security for mobile commerce." |
875 | Atos Worldline SA/NV Haachtsesteenweg 1142 Brussels, 1130 Belgium -Paul Stienon
|
Version boot: 4.01; FPGA: 661442 (Firmware) Part # PCI card 033-120010-1.0 |
boot firmware running on Intel386 EXTC; FPGA firmware running on Xilinx XC3S5000 | 10/7/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "DEP-PCI (a PCI adapter board) is a hardware cryptographic module primarily used in banking area. Its boot firmware together with an FPGA implements AES, SHA and CMAC, which are used for secure key entry, secure application loading and secure boot firmware update." |
874 | Secure64 Software Corporation 5600 South Quebec Street Suite 320D Greenwood Village, CO 80111 USA -Christopher Worley
|
Version 1.0 |
Intel Itanium Processor w/ Secure64's Source T Operating System | 10/7/2008 |
SHA-1     
(BYTE-only) "The Secure64 Cryptographic Module provides cryptographic services to Secure64 components and applications running on Secure64's SourceT operating system. The cryptographic module is statically linked with the SourceT OS and Secure64 application software by Secure64 to deliver FIPS 140-2 compliant products." |
873 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill Mcintosh
|
Version 2.0 |
AMD Athlon w/ Microsoft Windows Vista; AMD Athlon w/ Microsoft Windows XP; AMD Optron w/ Microsoft Windows Server 2003; Intel Pentium 4 w/ Microsoft Windows Server 2003; Intel Pentium 4 w/ Microsoft Windows Vista; Intel Pentium 4 w/ Microsoft Windows XP; | 10/7/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Fortress Crypto Module is a software library that can be used by a Windows Client Application for securing desktops, laptops or tablet PCs. It provides software routines necessary to secure wireless connectivity to corporate LANS protected by IEEE 802.11i access devices and other encryption methods." |
872 | Mares and Company PO Box 464429 Lawrenceville, GA 30042 USA -Dan Mares
|
Version 08.09.12.08.16 |
Intel Celeron w/ Microsoft Windows XP Professional SP3; Intel Pentium D w/ Microsoft Windows Vista Ultimate SP1; | 10/7/2008 |
SHA-1     
(BYTE-only) "Stand alone program performs SHA's of files within certain Windows environments. Only SHA1 is run by default. Other SHA segments must be requested by a command line switch. This is a command line program, and should be run within a CMD/Command prompt window." |
871 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Sakthi Subramanian
|
Version 1.1.2.1 |
RMI MIPSXLR w/ Linux/MIPS | 10/27/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The McAfee Network Security portfolio of purpose-built appliances delivers cost-effective, comprehensive and proactive network and system security with multi-gigabit performance for locations from branch offices to the network core." 11/18/08: Add new tested information; |
870 | Safend Inc. 32 Habarzel Street Tel Aviv, 69710 Israel -Alon Barel
|
Version 3.2 |
Intel® Pentium® 4 w/ Microsoft Windows XP Professional | 9/29/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Protector Cryptographic Library is to support the encryption routines for the Safend Protector product line which guards against data breaches by applying granular security policies over physical/wireless ports and removable storage." |
869 | Gemalto Austin Arboretum Plaza II 9442 Capital of Texas Hwy North Suite 4 Austin, TX 78759 USA -Pedro Martinez
|
Version 2.2 |
Infineon SLE88CFX4000P w/ Gemalto.net Smart Card | 9/29/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Gemalto .NET v2.2 Smart Card Platform implements a subset of the .NET Framework with high end cryptographic capabilities, including Random Number Generation, on Board Key Generation, and encryption and hashing algorithms such as DES, 3DES, AES, SHA, and 2048 bit RSA. The combination of advanced programmability provided by the .NET Framework and the high end security features make .NET v2.2 a perfect support for Enterprise and Government security solutions." |
868 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.42 (Firmware) |
Intel PXA930 624MHz processor with BlackBerry OS 4.6 | 9/29/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
867 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.48 (Firmware) |
Intel PXA930 624MHz processor with BlackBerry OS 4.6 | 9/29/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
866 | Telephonics Corporation 815 Broad Hollow Road Farmingdale, NY 11735 USA -Barry Wernick
|
Version openssl-0.9.8g (Firmware) Part # 010.6882-01, Version B1 |
Atmel AT91R40008 | 9/24/2008 |
SHA-1     
(BYTE-only) "TruLink is a fully duplex, short range wireless intercom system that may be employed on aircraft, boats and ground vehicles. AES-128 ECB encrypts communications between the wireless units. HMAC SHA-1 is employed for Code Authentication. Keys are integrated during production." 08/28/09: Update new tested version; |
865 | Telephonics Corporation 815 Broad Hollow Road Farmingdale, NY 11735 USA -Barry Wernick
|
Version openssl-0.9.8g (Firmware) Part # 010.6792-01, Version H1 |
Atmel AT91M40800 | 9/24/2008 |
SHA-1     
(BYTE-only) "TruLink is a fully duplex, short range wireless intercom system that may be employed on aircraft, boats and ground vehicles. AES-128 ECB encrypts communications between the wireless units. HMAC SHA-1 is employed for Code Authentication. Keys are integrated during production." 08/28/09: Update new tested version; |
864 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # SSG-20 |
Intel IXP625 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG 20 is a high performance security platform for small branch office and standalone businesses that want to stop internal and external attacks, prevent unauthorized access adn achieve regulatory compliance. The SSG 20 delivers to 160Mbps of stateful firewall traffic and 40 Mbps of IPSec VPN traffic." |
863 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # SSG-140 |
Intel IXP2325 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG 140 is a high-performance security platform." |
862 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # SSG-320M/SSG-350M |
Intel IXP2325 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG 300 series is a high-performance security platform." |
861 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # SSG-520M/SSG-550M |
Cavium Nitrox Lite | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG 520M and 550M are high-performance security platforms." |
860 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # SSG-5 |
Intel IXP625 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The SSG-5 is a high performance security platform for small branch office and standalone businesses that want to stop internal adnexternal attacks, prevent unauthorized access and achieve regulatory compliance. The SSG-5 delivers 160 Mbps of stateful firewall traffic and 40 Mbps of IPSec VPN traffic." |
859 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # NS-5200/NS-5400 |
Gigascreen 3 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The NS-5200 and NS-5400 are high-performance security platforms." |
858 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version ScreenOS 6.2 (Firmware) Part # NSISG-1000/NSISG-2000 |
Gigascreen 3 | 9/24/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The ISG 1000 and 2000 are high-performance security platforms." |
857 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.1.2 (Firmware) |
Intel 80333 | 9/24/2008 |
SHA-512 
(BYTE-only) "Cryptographic Acceleration Card" |
856 | Cavium Networks 805 E Middlefield Road Mountain View, CA 94109 USA -Ben Studer
-Eric Dudley
|
Part # CN5010-400BG564-SCP-G |
N/A | 9/11/2008 |
SHA-1     
(BYTE-only) "Cavium security algorithms are implemented via hardware acceleration blocks that are party of the Co-Processor 2 in the MIPs Release 2 architecture. Cavium also offers APIs to allow software interaction and updates that utilize these hardware blocks. Cavium can disable security cores to comply with related export laws and regulations." |
855 | RSA, The Security Division of EMC 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 3.0.0.1 |
Intel Celeron w/ Microsoft Windows XP Professional SP2; AMD Athlon X2 w/ Microsoft Windows Vista Ultimate; Intel Celeron w/ Red Hat Enterprise Linux AS 4.0 w/ LSB 3.0.3 | 9/11/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
854 | Blue Coat Systems, Inc. 420 North Mary Avenue Sunnyvale, California 94085-4121 USA -Sasi Murthy
-Sandy Hawke
|
Version 1.12.0 (Firmware) |
Intel Celeron; Intel Xeon; AMD Opteron; Intel Celeron with Cavium CN1010 Accelerator; Intel Xeon with Cavium CN1010 Accelerator; AMD Opteron with Cavium CN1010 Accelerator; Intel Celeron with Broadcom 5825 Accelerator; Intel Xeon with Broadcom 5825 Accelerator; AMD Opteron with Broadcom 5825 Accelerator | 9/11/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Cryptographic algorithm implementations for the Blue Coat WAN Application Delivery solutions which "stop the bad and accelerate the good", optimizing application performance and security for any user, anywhere, across the WAN for distributed enterprises. " |
853 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.1.2 (Firmware) Part # 3753424, Rev. -02 and -03 |
Intel 80333 | 9/11/2008 |
SHA-1     
(BYTE-only) SHA in this implementation does not support 0-length messages. "Cryptographic acceleration card" |
852 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Version P/N 730070001, v01.02.12 (Firmware) |
ARM 9 TDMI 32-bit Processor | 9/11/2008 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra Privacy Card (Hydra PC) Series II, Personal Encryption Device and Enterprise Edition, is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
851 | Netlib 65 North Ridge Road Stamford, CT 06905 USA -Neil Weicher
|
Version 8.601.1 |
AMD Athlon 64 w/ Windows 2000 Server; AMD Athlon 64 w/ Windows 2003; Intel Core 2 Duo w/ Windows 2000 Server; Intel Core 2 Duo w/ Windows 2003 Server; Intel Core 2 Duo w/ Windows x64 2003 Server; Intel Core 2 Quad w/ Windows 2000 Server; Intel Core 2 Quad w/ Windows 2003 Server; Intel C-2 Quad w/ Windows x64 2003 Server; Pentium IV w/ Windows 2000 Server; Pentium IV w/ Windows 2003 Server; Pentium III w/ Windows 2000 Server; Pentium III w/ Windows 2003 Server; Intel Xeon w/ Windows 2000 Server; Intel Xeon w/ Windows 2003 Server; Intel Xeon w/ Windows x64 2003 Server; | 9/5/2008 |
SHA-1     
(BYTE-only) SHA in this implementation does not support null message. "The Netlib Encryptionizer for SQL Server 8.601.1 provides encryption of data stored in MS SQL Server databases and backups. It can be deployed without programming and without adding any administrative overhead." |
850 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.0.11 (Firmware) |
Intel 80333 | 9/5/2008 |
SHA-1     
(BYTE-only) SHA in this implementation does not support 0-length messages. "Cryptographic Acceleration Card" |
849 | MRV Communications 295 Foster St. Littleton, MA 01460 USA -Tim Bergeron
|
Version 5.3.1 and 5.3.5 (Firmware) |
Freescale PQ1 MPC885 | 9/5/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The LX-4000T Series Console Servers provide secure remote service serial port access to devices in an organization's networks and infrastructures. This nearly eliminates the need for physical presence at a site to correct problems or manage its everyday operation." 11/07/09: Add new tested version; |
848 | MRV Communications 295 Foster St. Littleton, MA 01460 USA -Tim Bergeron
|
Version 5.3.1 and 5.3.5 (Firmware) |
Freescale PQ1 MPC885 | 9/5/2008 |
SHA-1     
(BYTE-only) "The LX-4000T Series Console Servers provide secure remote service serial port access to devices in an organization's networks and infrastructures. This nearly eliminates the need for physical presence at a site to correct problems or manage its everyday operation." 11/07/09: Add new tested version; |
847 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Jane Blanchard
|
Version 1.1 |
Dual-Core Intel Xeon w/ CentOS v4.3 | 8/28/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The HP Secure Key Manager automates encryption key generation and management. It is a hardened security appliance delivering identity-based access, administration and logging. Additionally, the Secure Key Manager provides reliable lifetime key archival with automatic multi-site key replication and failover capabilities." 09/21/09: Update vendor information; |
846 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 5.1 (Firmware) |
Broadcom BCM1250 MIPS | 8/28/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Fortress Secure Bridge is an all-in-one network access family with the most stringent security available today built in." |
845 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 5.1 (Firmware) |
Broadcom BCM1250 MIPS | 8/28/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Fortress Secure Bridge is an all-in-one network access family with the most stringent security available today built in." |
844 | Brocade Communications Systems, Inc. 1745 Technology Drive San Jose, CA 95110 USA -Albert Tao
|
Version SP_OpenSSL_1.0 (Firmware) |
Cavium CN3010 | 8/28/2008 |
SHA-1     
(BYTE-only) "Brocade OpenSSL SHA-1 implementation." 05/11/09: Update OE; |
843 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # SPYCOS (FUP7) v2.4 |
N/A | 8/28/2008 |
SHA-1     
(BYTE-only) "The Hydra Privacy Card (Hydra PC) Series II, Personal Encryption Device and Enterprise Edition, is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
842 | Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 USA -Prateek Jain
|
Version 4.1.2 |
Dual Xeon QuadCore w/ Linux derived from Red Hat Enterprise v5.1 | 8/28/2008 |
SHA-1     
(BYTE-only) "Accellion application uses SHA1 hash during DSA signature verification procedure for the software packages before installing them on the module." 09/26/08: Update vendor information; |
841 | Gesellschaft für sichere Mobile Kommunikation mbH 10117 Berlin, N/A Germany -Björn Rupp
-Frank Rieger
|
Version 2.0 |
ARM9 w/ Microsoft Windows Mobile 5.0; ARM11 w/ Microsoft Windows Mobile 6.1; VIA C3 w/ Microsoft Windows XP Embedded (SP2) | 8/15/2008 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CryptoPhone Cryptographic Library provides cryptographic services for the CryptoPhone Security Kernel, which is a portable multi-platform cryptographic module that provides strong encryption, authentication, key exchange, message integrity verification, and secure memory abstraction services to GSMK CryptoPhone encryption products." 09/16/08: Update vendor POC information; |
840 | Technical Communications Corporation 100 Domino Drive Concord, MA 01742 USA -Fidel Camero
|
Version 2.0 |
ARM9 w/ Microsoft Windows Mobile 5.0; ARM11 w/ Microsoft Windows Mobile 6.1; VIA C3 w/ Microsoft Windows XP Embedded (SP2) | 8/15/2008 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CipherTalk Cryptographic Library provides cryptographic functionality for the CipherTalk® 8000 Cryptographic Module, which is an Operating System Agnostic cipher engine that offers services that include encryption and key exchange algorithms, authentication algorithms, and integrity and verification algorithms." |
839 | SCsquare Ltd. 2A Habarzel St. Ramat Hahayal Tel Aviv, 69710 Israel -Yossi Fixman
|
Version 4.03 (Firmware) Part # SLE66CX680PE |
Infineon SLE66CX680PE smart card controller IC | 8/15/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Apollo OS V4.03 on SLE66CX680PE is a multi-purpose smart card utilizing an ISO 7816 file system. Apollo OS V4.03 is implemented as firmware in ROM of an Infineon SLE66CX680PE smart card controller IC." |
838 | CommVault Systems Inc. 2 Crescent Place Oceanport, NJ 07746 USA -Zahid Ilkal
-Andrei Erofeev
|
Version 1.0 |
Intel Core2 Duo w/ Microsoft Windows 2003; Intel Core2 Duo w/ Redhat Linux 5.0; UltraSPARC II w/ Sun Solaris 10 | 8/15/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "CommVault Crypto Library (CVCL) is a cryptographic software module used in various CommVault products. The module provides key generation, symmetric and asymmetric encryption, hash, HMAC and signature generation/verification services." |
837 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
|
Part # 117070002 |
N/A | 8/15/2008 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Hydra Privacy Card (Hydra PC) Series II, Personal Encryption Device and Enterprise Edition, is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files." |
836 | Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 USA -Prateek Jain
|
Version 0.9.8 |
Dual Xeon QuadCore w/ Linux derived from Red Hat Enterprise v5.1 | 8/8/2008 |
SHA-1     
(BYTE-only) "Accellion TLSv1 implementation uses the SHA1 in the cipher suite for secure web communication." 09/26/08: Update vendor information; |
835 | Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 USA -Prateek Jain
|
Version 4.4.8 |
Dual Xeon QuadCore w/ Linux derived from Red Hat Enterprise v5.1 | 8/8/2008 |
SHA-1     
(BYTE-only) "Accellion web application uses the SHA1 implementation to calculate the hash of the user password input for authentication purposes." 09/26/08: Update vendor information; |
834 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA -Tom Dickens
-Reid Carlisle
|
Version SPYCOS Series 2 (Firmware) |
Infineon SLE66CX642P Security Controller | 8/8/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SPYCOS® Series 2 is the latest addition to the SPYRUS family of cryptographic module ICs enabling both smart card and USB cryptographic tokens. It provides security critical capabilities in user authentication, message privacy and integrity, authentication, and secure storage in an IC form factor." 08/15/08: Correction was made to OES'; |
833 | Oberthur Technologies 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version FC10 (Firmware) Part # B0 |
ID-One Csmo v7.0 N | 8/8/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The ID-One Cosmo Smart Card Platform is a single chip multi-application that offers a highly secure architecture together with enhanced cryptographic services. The tested algorithm implementation applies to the following hardware part number: B0, BA, C8, CA, CB, C4, C7, C9, B7, CD, C6, with firmware version FC10." 01/27/09: Update implementation description; |
832 | N/A | N/A | N/A | 8/4/2008 | N/A |
831 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Rick Sellers
|
Version 1.0 (Firmware) Part # L6B0185 |
ARM926EJS | 8/4/2008 |
SHA-256 
(BYTE-only) "HP StorageWorks LTO-4 Ultrium 1840 Tape Drive provides mid-market and enterprise customers up to 1.6TB compressed storage capacity per cartridge with built-in AES 256-bit hardware data encryption to provide easy-to-enable security and prevent unauthorized access of encrypted tape cartridges." |
830 | Hewlett-Packard Development Company, L.P. 11445 Compaq Center Dr. W Houston, TX 77070 USA -Rick Sellers
|
Version 1.0 (Firmware) Part # L6A0185 |
ARM926EJS | 8/4/2008 |
SHA-256 
(BYTE-only) "HP StorageWorks LTO-4 Ultrium 1840 Tape Drive provides mid-market and enterprise customers up to 1.6TB compressed storage capacity per cartridge with built-in AES 256-bit hardware data encryption to provide easy-to-enable security and prevent unauthorized access of encrypted tape cartridges." |
829 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Part # DS1955B PB9 - 9.00.00 |
N/A | 7/25/2008 |
SHA-1     
(BYTE-only) Only supports messages with a length up to 512-bytes. "The Pitney Bowes iButton Postal Security Device (PSD) complies with FIPS 140-2 standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
828 | Toshiba Corporation 1 - 1, Shibaura 1-chome, Minato-ku Tokyo, Tokyo 105-8001 Japan -Yichang Chan
|
Version 1.16 (Firmware) |
Toshiba Proprietary SoC | 7/25/2008 |
SHA-256 
(BYTE-only) "Toshiba Secure Cryptographic Suite (TSCS) is a library of unique hardware and software cipher solutions which are standard encryption algorithm-based to provide Toshiba products and the systems using them a robust and secure data storage environment." |
827 | JVC KENWOOD Corporation 1-16-2, Hakusan, Midori-ku Yokohama-shi Kanagawa, 226-8525 Japan -Tamaki Shimamura
|
Version 1.6.0 (Firmware) |
Texas Instruments DSP | 7/25/2008 |
SHA-256 
(BIT) "A SHA-256 implementation designed for use in JVC KENWOOD secure communications products." 12/01/11: Updated vendor and implementation information; |
826 | Proxim Wireless Corporation 1561 Buckeye Drive Milpitas, CA 95035 USA -Cor van de Water
-Kishore Gandham
|
Version 1.0.0 (Firmware) |
Freescale MPC8241LVR166D | 7/18/2008 |
SHA-1     
(BYTE-only) "Proxim Tsunami MP.11 245054-R and 245054-S wireless products offer fixed and mobile WiMAX capabilities to distribute wireless broadband access supporting video, voice, and data applications. In FIPS mode, the modules support proprietary WORP protocol for wireless transmission and TLS, SSH, and SNMP for management." 10/16/08: Update vendor POC and implementation name; |
825 | Teletec Corporation 5617-107 Departure Drive Raleigh, NC 27616 US -Diane Hunter
-Harry Taji
|
Version 1.10 (Firmware) |
TMS320VC5470, ARM7TDMI Subsystem | 7/18/2008 |
SHA-1     
(BYTE-only) "A cryptographic algorithm library developed for TL905 module that includes implementations of: AES block cipher that works in ECB and OFB modes, ANSI X9.31 RNG based on AES and HMAC-SHA-1 hashed MAC function." |
824 | RSA, The Security Division of EMC 228 South Street Hopkinton, MA 01748 USA -Jeff Stone
-Nirav Mehta
|
Version 1.3 |
Intel Celeron (x86) w/ Windows Server 2003 SP2 (32-bit); AMD Athlon X2 (x64) w/ Windows Server 2003 SP2 (64-bit); Intel Itanium2 w/ Windows Server 2003 SP2 (64-bit) | 7/18/2008 |
SHA-256 
(BYTE-only) "RSA BSAFE® Crypto Kernel provides core cryptographic functionality optimized for very small code size and speed to meet the needs of the most constrained environments. It is the cryptographic foundation for RSA BSAFE security products designed for C/C++ developers." |
823 | Aruba Networks, Inc. 1322 Crossman Ave. Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 1.1 (Firmware) |
RMI-XLR | 7/11/2008 |
SHA-1     
(BYTE-only) "Cryptographic Firmware Library provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. Firmware library provides implementations for TDES, AES, SHA1, HMAC, RSA, and RNG(ANSI X9.31)" |
822 | LiteScape Technologies, Inc. 1000 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 USA |
Version v52b4 (Firmware) |
Atmel ARM 7 | 7/11/2008 |
SHA-1     
(BYTE-only) "SPAR (Secure Personal Authentication Reader) is a multi-factor authentication device that provides RFID, Biometric and Magnetic-card interfaces. Using the SPAR at the edge of VOIP networks when coupled with devices such as IP phone terminals dramatically increases the security, validation and personalization process for business applications." |
821 | LiteScape Technologies, Inc. 1000 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 USA |
Version 1.0.7 (Firmware) |
Atmel ARM 7 | 7/11/2008 |
SHA-1     
(BYTE-only) "SPAR (Secure Personal Authentication Reader) is a multi-factor authentication device that provides RFID, Biometric and Magnetic-card interfaces. Using the SPAR at the edge of VOIP networks when coupled with devices such as IP phone terminals dramatically increases the security, validation and personalization process for business applications." |
820 | LiteScape Technologies, Inc. 1000 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 USA |
Version 1.0.7 (Firmware) |
Atmel ARM 7 | 7/11/2008 |
SHA-1     
(BYTE-only) "SPAR (Secure Personal Authentication Reader) is a multi-factor authentication device that provides RFID, Biometric and Magnetic-card interfaces. Using the SPAR at the edge of VOIP networks when coupled with devices such as IP phone terminals dramatically increases the security, validation and personalization process for business applications." |
819 | Digi International, Inc. 11001 Bren Road East Minnetonka, MN 55343 USA -Brian O’Rourke
|
Version 1.0 (Firmware) |
MPC880VR133 | 7/11/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The latest entry in Digi's advanced console management line, the Digi Passport provides secure remote access to the console ports of computer systems and network equipment. In addition to conventional serial console connections, the Digi Passport connects to the service processors of the leading server vendors." |
818 | Mobile Armor, Inc. 400 South Mills Wood Rd Suite 300 Chesterfield, MO 63017 USA -Brian Wood
|
Version 3.0 |
Intel Core 2 Duo w/ Apple OS X 10.5; Intel Core 2 Duo w/ Fedora Core 8; Intel Core 2 Duo w/ Red Hat Linux Enterprise 5.1; Intel Core 2 Duo w/ SUSE 10; Intel Core 2 Duo w/ Ubuntu 7.10; Intel Pentium D w/ Microsoft Windows 2000; ARM w/ Microsoft Windows Mobile 6; Intel Core 2 Duo w/ Microsoft Windows Vista; Intel Pentium D w/ Microsoft Windows XP; Intel Xscale w/ Palm OS 5.4 | 7/11/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Provides cryptogaphic operations by performing reliable, high speed security services for Mobile Armor Data Protection for Full Disk Encryption of laptops, PCs and smartphones, and the encryption of files, folders and removable media on those devices." For OES - Intel Xscale w/ Palm OS 5.4, SHA is only tested for SHA-1, SHA-224, and SHA256; |
817 | Motorola Solutions, Inc. 1301 East Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Part # 5185912 Family |
N/A | 7/3/2008 |
SHA-256 
(BYTE-only) "The MACE cryptographic processor is used in security modules embedded in Motorola's Astro (TM) family of radio system products. It provides secure voice and data capabilities as well as APCO Over-The-Air-Rekeying and advanced key management. The Part #5185912 Family includes part numbers 5185912Y01 and 5185912Y03." 01/30/12: Updated implementation and vendor information; |
816 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
|
Version 5.2.3790.4313 |
Intel Celeron w/ Windows Server 2003 SP2 (x86); AMD Athlon X2 w/ Windows Server 2003 SP2 (x64); Intel Itanium2 w/ Windows Server 2003 SP2 (IA64) | 7/3/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Enhanced Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based, cryptographic module. RSAENH encapsulates several different cryptographic algorithms (including SHS, TDES, AES, RSA, SHS-based HMAC) in a cryptographic module accessible via the Microsoft CryptoAPI." |
815 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.0.10 (Firmware) |
Intel 80333 | 7/3/2008 |
SHA-1     
(BYTE-only) Does not support null message "Cryptographic Acceleration Card" |
814 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Joel Tang
|
Part # 2231/2232 |
N/A | 7/3/2008 |
SHA-1     
(BYTE-only) "As the world's leading memory manufacturer Kingston offers the marketplace a variety of secure USB devices designed to protect data at rest. By utilizing 256bit AES encryption via the Kingsafe application, the Kingston USB drives offer a high level of security certified to FIPS 140-2 standards. " |
813 | Vertex Standard LMR, Inc. Sumitomo Fudosan Tamachi First Building 4-6-8 Shibaura Minato-ku, Tokyo 108-0023 Japan |
Version SHA - 1.00.00 (Firmware) |
Texas Instruments, Inc. TMS320VC54x series | 7/3/2008 |
SHA-256 
(BYTE-only) "Implementation of the SHA-256 algorithm that will be used for the secure products of Vertex Standard." 06/06/14: Updated vendor information; |
812 | Seagate Technology, LLC. 380 Disc Drive Longmont, CO 80503 USA -Monty Forehand
|
Version 1.0 |
Seagate Secure@ Disk Drive embedded controller: Kahu | 7/3/2008 |
SHA-1     
(BYTE-only) Does not support NULL message. "Seagate leads the industry in delivering Self Encrypting Drives that are widely used by government agencies, global corporations and small businesses for Instant Secure Erase and to secure data against theft. Seagate SecureTM Self Encrypting Drives preserve manageability and performance in systems from storage arrays to notebooks." 05/26/09: Update implementation info; |
811 | AJA Video Systems, Inc. 443 Crown Point Circle Grass Valley, CA 95945 USA -Andy Witek
|
Version 1.0 (Firmware) |
Xilinx PowerPC | 7/3/2008 |
SHA-1     
(BYTE-only) "A PowerPC implementation of the SHA-1 algorithm." |
810 | AJA Video Systems, Inc. 443 Crown Point Circle Grass Valley, CA 95945 USA -Andy Witek
|
Version 1.0 (Firmware) |
Dallas DS5250 | 7/3/2008 |
SHA-1     
(BYTE-only) "A DS5250 implementation of the SHA-1 algorithm." |
809 | AJA Video Systems, Inc. 443 Crown Point Circle Grass Valley, CA 95945 USA -Andy Witek
|
Version 1.0 (Firmware) |
Xilinx FPGA | 7/3/2008 |
SHA-1     
(BYTE-only) Does not support null message. "An FPGA implementation of the SHA-1 algorithm." |
808 | Firetide, Inc. 16795 Lark Avenue Suite 200 n/a Los Gatos, CA 95032 USA -Murali Repakula
|
Version openssl-fips-1.1.2 (Firmware) |
armv5b | 7/3/2008 |
SHA-512 
(BYTE-only) "This is RSA/SHA1 implementations that allow Firetide Digital Certificate based authentication for SSL, SSH, and other system accesses." |
807 | RSA Security, Inc. 177 Bovet Road, Suite 200 San Mateo, CA 94402 USA -Kathy Kriese
|
Version 3.0 |
IBM Power3 w/ AIX 5L 5.3 (32-bit); IBM Power3 w/ AIX 5L 5.3 (64-bit); PA-RISC 2.0 w/ HP-UX 11i v1 (32-bit); PA-RISC 2.0W w/HP-UX 11i v2 (64-bit); Intel Itanium2 w/ HP-UX 11i v3 (32-bit); Intel Itanium2 w/ HP-UX 11i v3 (64-bit); Intel Celeron w/ Red Hat Enterprise Linux AS 4.0 (32-bit w/ LSB 3.0.3); Intel AMD Athlon X2 w/ Red Hat Enterprise Linux AS 5.0 (64-bit w/ LSB 3.0.3); SPARC V8 w/ Solaris 10 (32-bit); SPARC V8+ w/ Solaris 10 (32-bit); SPARC V9 w/ Solaris 10 (64-bit); AMD Opteron w/ Solaris 10 (64-bit); PowerPC 603 w/ VxWorks 5.5; PowerPC 604 w/ VxWorks 5.5; PowerPC 604 w/ VxWorks 6.0; Intel PXA250 w/ Windows Mobile 2003; Intel PXA270 w/ Windows Mobile 5; Intel PXA270 w/ Windows Mobile 6.0; AMD Athlon X2 w/ Windows Server 2003 SP2 (64-bit w/ MT Static Wrap); Intel Itanium2 w/ Windows Server 2003 SP2 (64-bit w/ MT Static Wrap); Intel Itanium2 w/ Windows Server 2003 SP2 (w/ MD Dynamic Wrap); Intel Pentium M w/ Windows XP Professional SP2 (w/ MT Static Wrap); AMD Athlon X2 w/ Windows Vista Ultimate (32-bit w/ MD Dynamic Wrap); Intel Pentium D w/ Windows Vista Ultimate (64-bit w/ MD Dynamic Wrap) | 7/3/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
806 | Vormetric, Inc. 3131 Jay Street Santa Clara, CA 95054 USA -Phil Scott
-Frank Teruel
|
Version 1.0 |
AMD Opteron w/ Red Hat Enterprise Linux 4.0 Update 4 64 bit; Sun UltraSparc II w/ Solaris 8; Sun UltraSparc II w/ Solaris 9; Sun UltraSparc II w/ Solaris 10; Intel Xeon w/ Windows 2000 Advanced Server SP4; Intel Xeon w/ Windows 2003 Server Enterprise SP 32 bit; Intel Xeon w/ Windows 2003 Server Enterprise SP2 X64 Edition; Intel Itanium 2 w/ Windows 2003 Server Enterprise SP2 64-bit | 7/3/2008 |
SHA-1     
(BYTE-only) "The Media Server Encryption Option (MSEO) Cryptographic Library provides cryptographic services to the Netbackup MSEO driver." |
805 | Attachmate Corporation 1500 Dexter Ave N Seattle, WA 98109 USA -Diana Agemura
-Scott Rankin
|
Version 2.0.40 |
Intel Xeon w/ Red Hat v4 (s390) on Hercules 3.05 on Red Hat v5; IBM s390 w/ SuSE Linux Enterprise Server 9; IBM Power5 w/ AIX 5.2; PA-RISC w/ HP-UX 11.11; Sun Ultra-SPARC w/ Solaris 8; Intel Itanium 2 w/ HP-UX 11i v3; Intel Itanium 2 w/ Red Hat Enterprise Linux v4; Intel Itanium 2 w/ Windows Server 2003 SP2; AMD Opteron w/ Solaris 10; AMD Opteron w/ SuSE Linux Enterprise Server 9.0; AMD Athlon64 x2 w/ Windows Server 2003 SP2; Intel Celeron w/ Solaris 10 (x86); Intel Pentium D w/ Red Hat Enterprise Linux v4; Intel Celeron w/ Windows Server 2003 SP2 | 7/3/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) |
804 | BigFix, Inc. 1480 64th St. Suite 200 n/a Emeryville, CA 94608 USA -Noah Salzman
-Peter Loer
|
Version 1.0 |
IBM p610 using Power3-II CPU w/ AIX 5L for Power v5.2 Program Number 5765-E62; HP C3000 using 64-bit PA-8500 400 MHz CPU w/ HP-UX 11.11; HP XW4100 using Intel Pentium 4 3GHz CPU w/ Red Hat Enterprise Linux 4 Update 2 (32-bit); HP Proliant DL145 G2 using AMD 64 Opteron 2GHz CPU w/ Red Hat Enterprise Linux 4 Update 2 (64-bit); Dell Precision 650 using Dual Xeon 3.0GHz CPU w/ Solaris 10 (x86); Sun Blade 150 using Ultraspace IIe 650MHz CPU w/ Solaris 10 (Sparc); Sun Blade 150 using Ultrasparc IIe 650MHz CPU w/ Solaris 9 (Sparc); IBM eServer 325 using Dual AMD Opteron 2GHz CPU w/ SuSE Linux Enterprise Server v9; Dell Optiplex GX400 using Pentium 4 CPU w/ Windows 2000 Pro SP3; Dell Optiplex GX270 using Pentium 4 CPU w/ Windows 2003 Enterprise Edition SP1; Dell Optiplex GX270 using Pentium 4 CPU w/ Windows XP Pro SP2; Mac OS X: iMac using PowerPC G4 CPU w/ Mac OS X 10.3.6 | 6/13/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The BigFix Cryptogrpahic Module is the software library used to support authentication, validation, and encryption routines for the BigFix 7 Platform." 07/18/08: Add new OES; |
803 | IBM Corporation 11400 Burnet Road Austin, TX 78758 USA -Kevin Driver
|
Version 1.3 |
Intel Pentium 4 w/ Windows XP Professional SP2 with IBM JVM 1.6.0 | 6/13/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for Multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework that is part of all JVM's at the 1.4.0 level and higher." |
802 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Rob Williams
|
Version 2.2 |
Intel Core 2 Duo w/ Windows 2008 Server 64-bit w/ JRE 1.6.0; Intel Pentium III w/ Linux Redhat AS5 32 Bit w/ JRE 1.6.0; Intel Pentium D w/ Redhat Linux AS5 64 bit w/ JRE 1.6.0; Sun UltraSPARC III w/ Solaris 10 32 Bit w/ JRE 1.6.0; Sun UltraSPARC III w/ Solaris 10 64 bit w/ JRE 1.6.0; Intel Pentium D w/ Windows Vista 32 bit w/ JRE 1.6.0; Intel Core 2 Duo w/ Windows Vista 64 bit w/JRE 1.6.0; Intel Celeron w/ NetBSD v2.0.3 w/ CDC 1.1; PMC-SierraRM7035C-533L w/ NetBSD v2.0.3 w/ CDC 1.1 | 6/13/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications." 11/19/09: Add new tested OES'; |
801 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Michael Scruggs
|
Part # Nitrox PX Series Die V1.2 |
N/A | 6/13/2008 |
SHA-1     
(BYTE-only) "Each identical processor core on the NITROX PX die implements several security and math algorithms, including ModEx (and RSA), ECC, 3DES, AES256, KASUMI, SHA1, SHA2, and MD5 (hash and HMAC). Performance ranges: 500Mbps to 2.5Gbps of encryption bandwidth; 4k to 17k RSA's; 6k to 25k DH operations per second. Accelerate IPSec, SSL, XML, and WLAN." |
800 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version 01.03.05 (Firmware) |
IBM PowerPC 405GPr | 6/9/2008 |
SHA-1     
(BYTE-only) "The ViaSat Enhanced Bandwidth Efficient Modem (EBEM-500) series Satcom Modem provides the latest in efficient modulation and coding for point-to-point Satcom connections. The EBEM-500 series offers embedded encryption integrating the security functions into the modem to provide an integrated secure Satcom modem product." |
799 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.1.1 (Firmware) |
Intel 80333 | 6/9/2008 |
SHA-512 
(BYTE-only) "Cryptographic Acceleration Card" |
798 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.02 (Firmware) |
PowerPC 440EPx | 6/9/2008 |
SHA-1     
(BYTE-only) "The Atalla Cryptographic Engine 006 (ACE006) is a multiple-chip cryptographic module that provides secure cryptographic processing. The ACE006 features secure key management and storage capabilities, and also provides high performance AES processing. ACE006 is used in the Atalla Secure Print Advantage Series products." 09/12/11: Update vendor information; |
797 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA |
Version S3201W7K9-12308JK (Firmware) |
IBM 405GP PowerPC | 6/9/2008 |
SHA-1     
(BYTE-only) The SHA implementation only supports messages less than 16 kb in size "The Cisco® 3201 Wireless Mobile Interface Card (WMIC) for the Cisco 3200 Series Rugged ISR provides integrated 802.11b/g wireless WAN or LAN capabilities." |
796 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Mehdi Bonyadi
|
Version 1.1.1 (Firmware) Part # 3753424, Rev. -02 and -03 |
Intel 80333 | 5/28/2008 |
SHA-1     
(BYTE-only) SHA-1 implementation does not support 0-length message. "Cryptographic acceleration card" |
795 | ERUCES, Inc. 11142 Thompson Ave. Lenexa, Kansas 66219 U.S.A. -Dr. Bassam Khulusi
-Oggy Vasic
|
Version 7.0 |
AMD Opteron w/ Red Hat Enterprise Linux 5; Intel Pentium 4 w/ Windows Server 2003 R2 | 5/28/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) "Tricryption Cryptographic Module is a software library providing cryptographic services for ERUCES’ Tricryption family of high volume encryption & key management products including key servers, file, database, executables encryption, and special services (anonymization, de-identification, & privacy protection)." 07/17/08: Update implementation information; |
794 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA -Mike Soto
|
Version 12.4(15) T3 (Firmware) |
QED RM5261A; 7065C MIPS; Broadcom BCM1125H | 5/28/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Cisco 1800, 2800 and 3800 Series of integrated Services Routers intelligently embed data and security into a single, resilient system for fast, scalable delivery of mission-critical business applications from small offices to demanding enterprise environments." |
793 | Dark Matter Labs Inc. 2687 Nugget Terrace Victoria, BC V9B 6A7 Canada -Jeff MacMillan
|
Version 1.0.0 (Firmware) |
AMD Opteron™; VIA C7 | 5/22/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Dark Matter's j-series cryptographic library consists of numerous crypto modules used within its line of VIA and Opteron hardware-based multi-purpose encryption appliances." 01/06/11: Update vendor and implementation information; |
792 | Rajant Corporation 400 East King Street Malvern, PA 19355 USA -Marty Lamb
|
Part # ME2 1S2F |
N/A | 5/22/2008 |
SHA-1     
(BYTE-only) "The Rajant BreadCrumb ME2 is a rugged wireless data transmitter-receiver that transparently forms a mesh" |
791 | Francotyp Postalia GmbH Triftweg 21-26 Birkenwerder, 16547 Germany -Hasbi Kabacaoglu
|
Version 1.08.163 (Firmware) |
S3C44B0X | 5/22/2008 |
SHA-1     
(BYTE-only) "The firmware implementation of the FP Crypto Library, which runs on an embedded hardware module, with a Samsung S3C44B0X processor. The cryptographic algorithm implementation is used in context of security critical services." |
790 | Cisco Systems, Inc. 7025-6 Kit Creek Road Research Triangle Park, NC 27709 USA -Chris Romeo
|
Version 7.2.2.27 (Firmware) |
Intel Celeron; Intel Pentium 4 | 5/22/2008 |
SHA-1     
(BYTE-only) "The market-leading Cisco PIX and ASA security appliances deliver robust user and application policy enforcement and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco PIX and ASA security appliances provide comprehensive security, performance, and reliability for network environments of all sizes." |
789 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version 0106.7130.0207 (Firmware) Part # AT90SC25672RCT-USB vD |
Atmel AT90SC25672RCT-USB | 5/22/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Athena Smartcard is a global company offering a wide range of ID products for Government and Enterprise customers: FIPS 140-2 and 201 certified smart card operating systems in a variety of form-factors on various chips, readers, cross-platform cryptographic middleware and innovative biometric and card management solutions." |
788 | Pulse Secure, LLC. 2700 Zanker Road, Suite 200 San Jose, CA 95134 USA -Yvonne Sang
|
Version 2.0 |
Intel Xeon x86 w/ Windows XP Service Pack 2 | 5/13/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Odyssey Security Component / Portable (OSC/P) is a general purpose cryptographic library. This portable (C) version can be compiled for use on a large variety of platforms." 07/03/08: Updated OES; |
787 | Pulse Secure, LLC. 2700 Zanker Road, Suite 200 San Jose, CA 95134 USA -Yvonne Sang
|
Version 2.0 |
Intel Xeon x86 w/ Windows XP Service Pack 2; Intel Pentium 4 w/ Windows 2000 Service Pack 3 | 5/13/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Odyssey Security Component (OSC) is a general purpose cryptographic library." 07/03/08: Updated OES; |
786 | Gemalto Arboretum Plaza II 9442 Captial of Texas Highway North Suite 400 Austin, TX 78759 USA -Vincent Prothon
|
Version GX4-FIPS EI08 (Firmware) |
NXP P5CD144 | 5/13/2008 |
SHA-1     
(BYTE-only) "This module is based on a Java platform (GemCombiXpresso R4) with 144K EEPROM memory and on the SafesITe FIPS201 applet loaded on the Java Card platform. The Cryptographic Module provides dual interfaces (i.e. contact and contact-less) where the same security level is achieved. Module Ref# A1005963 - Card Ref# M1002255." |
785 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
|
Version 5.1.2600.5512 |
Intel Pentium D w/ Windows XP Professional SP3 | 5/13/2008 |
SHA-1     
(BYTE-only) "FIPS.sys is a general-purpose, software-based, cryptographic module residing at the Kernel level of the Windows Operating System. It runs as a kernel mode export driver (a kernel-mode DLL) and encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible by other kernel mode services." |
784 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
|
Version 5.1.2600.5507 |
Intel Pentium D w/ Windows XP Professional SP3 | 5/13/2008 |
SHA-1     
(BYTE-only) "The Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based, cryptographic module. DSSENH encapsulates several different cryptographic algorithms (including SHA-1, DES, TDES, DSA) in a cryptographic module accessible via the Microsoft CryptoAPI." |
783 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
|
Version 5.1.2600.5507 |
Intel Pentium D w/ Windows XP Professional SP3 | 5/13/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Enhanced Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based, cryptographic module. RSAENH encapsulates several different cryptographic algorithms (including SHS, DES, TDES, AES, RSA, HMAC) in a cryptographic module accessible via the Microsoft CryptoAPI." |
782 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -William McIntosh
|
Version 4.1.0 Build 4278X |
Intel Celeron M w/ Windows XP Professional with SP2; Intel Celeron M w/ Windows 2000 Professional with SP4; AMD Athlon X2 w/ Windows Vista Ultimate Edition; Intel Pentium 4 w/ Windows Server 2003 SP2 | 5/13/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The FTI Driver is apart of the Fortress Secure Client designed to deliver security on wireless devices such as bar scanners, handhelds, and laptops using various operating systems. A plug-and-play solution, the Client encrypts and decrypts communication across the WLAN and protects the device against attacks without user intervention." |
781 | RMI Corporation 18920 Forge Drive Cupertino, CA 95014 USA -Mark Litvack
|
Part # XLS Series Processors A1 |
N/A | 5/13/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RMI's XLS series devices include the XLS408 and XLS404 processors. The XLS processors combine the power of innovative multi-processing and multi-threaded architecture with the simplicity of a leading edge, general purpose MIPS64-based machine enabling wire speed across multiple platforms." |
780 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.5 (Firmware) |
Intel PXA901 312MHz processor with BlackBerry OS 4.5 | 5/7/2008 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
779 | ERUCES, Inc. 11142 Thompson Ave. Lenexa, Kansas 66219 U.S.A. -Dr. Bassam Khulusi
-Oggy Vasic
|
Version 7.0 |
AMD Opteron w/ Red Hat Enterprise Linux 5; Intel Pentium 4 w/ Windows Server 2003 R2 | 5/7/2008 |
SHA-384 
(BYTE-only) "Tricryption Client Kernel Level Cryptographic Module is a kernel-level software library providing cryptographic services for ERUCES’ transparent file system encryption driver. This includes protection for directories/ folders/drives, files of a specific type, and even executables on laptops, desktops and servers." 07/17/08: Update implementation information; |
778 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.00 (Firmware) |
PowerPC 440EPx | 5/7/2008 |
SHA-256 
(BYTE-only) "The Atalla Cryptographic Engine 006 (ACE006) is a multiple-chip cryptographic module that provides secure cryptographic processing. The ACE006 features secure key management and storage capabilities, and also provides high performance AES processing. ACE006 is used in the Atalla Secure Print Advantage Series products." 09/12/11: Update vendor information; |
777 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5.32a (Firmware) |
Intel PXA901 312MHz processor with BlackBerry OS 4.5 | 5/7/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds and Smartphones." |
776 | Optica Technologies Inc. 2051 Dogwood St Suite 210 n/a Louisville, CO 80027 USA -William Colvin
-Gil Fisher
|
Version 1.0 (Firmware) |
Intel Xeon processor | 4/30/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "THE ECLIPZ ESCON TAPE ENCRYPTOR IS DESIGNED TO BE INSERTED IN AN ESCON FIBER OPTIC CHANNEL BETWEEN AN IBM MAINFRAME COMPUTER AND A TAPE DRIVE TO ENCRYPT DATA BEING SENT TO THE TAPE DRIVE." |
775 | Broadcom Corporation 1131 W Warner Road Tempe, AZ 85284 USA -Gary McCulley
|
Part # BCM5861 Version A0 |
N/A | 4/18/2008 |
SHA-1     
(BYTE-only) "The BCM5861 is a fully-featured security processor optimized to provide high-performance cryptographic acceleration, as well as IPSec and SSL/TLS protocol processing." |
774 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Sean Gibbons
|
Version 1.1 |
Intel Pentium 4 w/ Windows XP | 4/18/2008 |
SHA-1     
(BYTE-only) "A secure rendering plug-in that provides AES encryption of print data from the host through a print server with the AES encrypted data continuing on to a Lexmark decryption-enabled device. The rendering plug-in uses the Lexmark device's public key such that only the target device will be able to decrypt the data." |
773 | Motorola Solutions Inc. Unit A1, Linhay Business Park Ashburton, Devon TQ13 7UP UK -Richard Carter
|
Version PTP600-SHA-01-00 |
C64XX w/ TI DSP BIOS | 4/9/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) ""The Motorola famiy of PTP Wireless Ethernet Bridges offers a solution to the challenge of establishing a reliable, secure, point-to-point network connection. Whether operating in a Non-Line-of-Sight (NLoS), adverse or marginally adverse environment."" |
772 | BeCrypt Ltd. Wyvols Court Swallowfield Reading, Berkshire RG7 1WY UK -Pali Surdhar
-Bernard Parsons
|
Version 1.0 |
Intel Core 2 w/ Microsoft Windows XP Pro SP2; Intel Core 2 w/ Ubuntu Linux (Version 8.04) | 4/9/2008 |
SHA-256 
(BYTE-only) "This is the 32 bit subcomponent implementation for the BeCrypt Cryptographic Module." 04/29/08: Add new OES; |
771 | BeCrypt Ltd. Wyvols Court Swallowfield Reading, Berkshire RG7 1WY UK -Pali Surdhar
-Bernard Parsons
|
Version 1.0 |
Intel Core 2 w/ Real Mode pre-boot environment | 4/9/2008 |
SHA-256 
(BYTE-only) "This is the 16 bit subcomponent implementation for the BeCrypt Cryptographic Module." 05/30/08: Update the OS; |
770 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Republic of China -tulip@cht.com.tw
|
Part # EP2C70F672C6N |
N/A | 4/9/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "HiPKI SafGuard 1000 Cryptographic Library provides highly-secure cryptographic services,i dentity-based challenge-response authentication, and key storage for PKI Applications in the HiPKI SafGuard 1000 HSM." |
769 | NetLogic Microsystems, Inc. 3975 Freedom Circle Santa Clara, CA 95054 USA -Mark Litvack
|
Part # P/N XLR Version C4 |
N/A | 4/9/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "NetLogic Microsystems’ XLR and XLS series of processors offer high-throughput general purpose processing with an array of integrated I/O. They combine the power of innovative multi-core and multi-threaded architecture with the simplicity of a leading edge, general purpose MIPS64-based machine enabling wire speed performance." 08/31/10: Update vendor and implementation information; |
768 | RMI Corporation 18920 Forge Drive Cupertino, CA 95014 USA -Mark Litvack
|
Part # XLR Series Processors B2 |
N/A | 4/9/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "RMI's XLR series devices include the XLR732, XLR716, XLR532, XLR516, XLR508, and XLR308 processors. They are the ultimate in performance, combining the power of innovative multi-core adn multi-threaded architecture with the simplicity of a leading edge, general purpose MIPS64-based machine." |
767 | Kingston Technology Company, Inc. 17600 Newhope Street Fountain Valley, CA 92708 USA -Mark Akoubian
|
Version 4.0 (Firmware) |
Phison Electronics PS223x | 4/9/2008 |
SHA-1     
(BYTE-only) "As the world's leading memory manufacturer Kingston offers the marketplace a variety of secure USB devices designed to protect data at rest. By utilizing 256bit AES encryption via the Kingsafe application, the Kingston USB drives offer a high level of security certified to FIPS 140-2 standards." |
766 | GuardianEdge Technologies Inc. 475 Brannan Street, Suite 400 San Francisco, CA 94107 USA -Seth Ross
|
Version 1.0.4 |
Intel Pentium M w/ Microsoft Windows Vista; Intel Pentium M w/ Microsoft Windows XP | 4/9/2008 |
SHA-1     
(BYTE-only) Does not support the null message "The Encryption Plus® Cryptographic Library ("EPCL") provides cryptographic services to the GuardianEdge, Encryption Anywhere, and Encryption Plus families of data protection products." |
765 | Francotyp Postalia GmbH Triftweg 21-26 Birkenwerder, 16547 Germany -Hasbi Kabacaoglu
-Clemens Heinrich
|
Version 1.08.051 (Firmware) |
S3C44B0X | 3/27/2008 |
SHA-256 
(BYTE-only) "The firmware implementation of the FP DW Library, which runs on an embedded hardware module, with a Samsung S3C44B0X processor. The cryptographic algorithm implementation is used in context of security critical services." |
764 | nCipher Corporation Ltd. Jupiter House, Station Road Cambridge, CB1 2JD United Kingdom -Marcus Streets
-Mark Wooding
|
Version 6.0 (Firmware) |
Motorola Power PC running a proprietary Operating System | 3/27/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's nShield Hardware Security Modules." |
763 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.3 (Firmware) |
Intel PXA901 312MHz processor with BlackBerry OS 4.3 | 3/18/2008 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds." |
762 | Alcatel-Lucent 101 Crawfords Corner Rd Holdmel, NJ 07733 USA -Paul Fowler
-Andrew Ferreira
|
Part # 1.0 |
N/A | 3/18/2008 |
SHA-1     
(BYTE-only) "The Hifn 7955 accelerator card is used in Alcatel-Lucent VPN Firewall Bricks." |
761 | Giesecke & Devrient 45925 Horseshoe Drive Dulles, VA 20166 USA -Michael Poitner
-Jatin Deshpande
|
Version CPDYxJCRSEFI-025CD144V503 (Firmware) |
NXP P5CD144 | 3/18/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sm@rtCafé Expert 3.2 is a Java Card 2.2.1 and Global Platform v2.1.1 compliant smart card module supporting contact and contactless interfaces. Its support includes RSA up to 2048 bits with key generation, Hash algorithms (including SHA256), SEED, AES, DSA, OAEP Padding and Triple-DES." |
760 | Giesecke & Devrient 45925 Horseshoe Drive Dulles, VA 20166 USA -Michael Poitner
-Jatin Deshpande
|
Version CPDIxJCRSEFI-025CD080V402 (Firmware) |
NXP P5CD080 | 3/18/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sm@rtCafé Expert 3.2 is a Java Card 2.2.1 and Global Platform v2.1.1 compliant smart card module supporting contact and contactless interfaces. Its support includes RSA up to 2048 bits with key generation, Hash algorithms (including SHA256), SEED, AES, DSA, OAEP Padding and Triple-DES." |
759 | Giesecke & Devrient 45925 Horseshoe Drive Dulles, VA 20166 USA -Michael Poitner
-Jatin Deshpande
|
Version CPDHxJCRSEFI-025CC073V202 (Firmware) |
NXP P5CC073 | 3/18/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Sm@rtCafé Expert 3.2 is a Java Card 2.2.1 and Global Platform v2.1.1 compliant smart card module supporting contact and contactless interfaces. Its support includes RSA up to 2048 bits with key generation, Hash algorithms (including SHA256), SEED, AES, DSA, OAEP Padding and Triple-DES." |
758 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Part # DS1955B PB8 - 8.00.00 |
N/A | 3/18/2008 |
SHA-1     
(BYTE-only) Only support input lengths up to 512-bytes. "The Pitney Bowes iButton Postal Security Device (PSD) complies with FIPS 140-2 standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
757 | Silicon Graphics Inc. 2750 Blue Water Road Eagan, MN 55121 USA -Lori Gilbertson
|
Version openssl0.9.8b-8.3.el5_0.2 |
Intel Xeon EM64T w/ Red Hat Enterprise Linux 5 Update 1 | 3/18/2008 |
SHA-1     
(BYTE-only) "TDES, AES, SHA-1, and RSA as used and provided by RHEL5 U1 on SGI Altix XE Servers (200 series and 300 series)" |
756 | Silicon Graphics Inc. 2750 Blue Water Road Eagan, MN 55121 USA -Lori Gilbertson
|
Version openssl0.9.8b-8.3.el5_0.2 |
Intel Itanium2 w/ Red Hat Enterprise Linux 5 Update 1 | 3/18/2008 |
SHA-1     
(BYTE-only) "TDES, AES, SHA-1, and RSA as used and provided by RHEL5 U1 on SGI Altix 400 series and 4000 series" |
755 | AudioCodes 1 Hayarden St. Airport St., Lod 70151 Israel -Yair Elharrar
|
Version 1.0 |
AudioCodes AC48x/AC49x w/ Proprietary AudioCodes OS | 3/18/2008 |
SHA-1     
(BYTE-only) "Voice-over-IP media gateway" |
754 | AudioCodes 1 Hayarden St. Airport St., Lod 70151 Israel -Yair Elharrar
|
Version 0.9.8d |
Freescale (MPC8xx/MPC82xx) w/ pSOS+ 2.5 | 3/18/2008 |
SHA-1     
(BYTE-only) "Voice-ove-IP media gateway" |
753 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
-Kelvin Yu
|
Version 1.1 |
Intel Pentium D w/ Windows Vista Ultimate SP1 (x86); Intel Pentium D w/ Windows Vista Ultimate SP1 (x64); Intel Pentium D w/ Windows Server 2008 (x86); Intel Pentium D w/ Windows Server 2008 (x64); Intel Itanium2 w/ Windows Server 2008 (IA64) | 3/18/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows Cryptographic Primitives Library is a general purpose, software-based, cryptographic module which can be dynamically linked into applications by developers to permit the use of FIPS 140-2 Level 1 compliant cryptography." |
752 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5 B (Firmware) |
Intel PXA901 | 3/3/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds." |
751 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.5 C (Firmware) |
Intel PXA901 | 3/3/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds." |
750 | VIACK Corporation 16701 NE 80th St., Suite 100 Redmond, WA 98052 USA -Peter Eng
|
Version 6.0 |
Intel x86 w/ Windows Vista; Intel x86 w/ Windows XP | 3/3/2008 |
SHA-1     
(BYTE-only) "The VIA3 VkCrypt Cryptographic Module is a software cryptographic module that implements symmetric and public key encryption, digital signatures, and hashing. VIA3 is a secure online collaboration solution integrating real-time audio and video, instant messaging, application sharing, and access to workspaces." |
749 | Brocade Communications Systems, Inc. 1600 Technology Drive San Jose, CA 95110 USA -Vidya Renganarayanan
|
Version FIPS_OpenSSL_1.0 (Firmware) |
PowerPC 440GX; PowerPC 8548 | 3/3/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "SHA1 and SHA256 implementation in Brocade firmware." |
748 | AMCC Corp 4000 CenterGreen Way Suite 200 Cary, NC 27513 USA -Nick Balafas
-Mike Servedio
|
Part # PPC440GRx |
N/A | 3/3/2008 |
SHA-1     
(BYTE-only) 0 Length Message not supported "The AMCC PowerPC 440EPx and 440GRx are high performance embedded System on Chips (SoC's) offering a wide range of I/O interfaces such as USB 2.0, Gigabit Ethernet, NAND Flash and on-chip security acceleration hardware. They are ideally suited to a wide range of applications, including imaging, industrial control and networking." |
747 | AMCC Corp 4000 CenterGreen Way Suite 200 Cary, NC 27513 USA -Nick Balafas
-Mike Servedio
|
Part # PPC440EPx |
N/A | 3/3/2008 |
SHA-1     
(BYTE-only) 0 Length Message not supported "The AMCC PowerPC 440EPx and 440GRx are high performance embedded System on Chips (SoC's) offering a wide range of I/O interfaces such as USB 2.0, Gigabit Ethernet, NAND Flash and on-chip security acceleration hardware. They are ideally suited to a wide range of applications, including imaging, industrial control and networking." |
746 | Meshdynamics, Inc 2953 Bunker Hill Ln Ste 400 Santa Clara, CA 95054 USA -Sriram Dayanandan
-Francis daCosta
|
Version 2.0 (Firmware) |
Intel IXP420 | 2/21/2008 |
SHA-1     
(BYTE-only) "Multi-Radio Wireless Mesh Networking Node. Nodes connect to each other forming a “MESH” network. Data from Client devices connected to the mesh node is routed according to the destination address. Client devices need to authenticate before they can join the network. All data from client is encrypted using AES-CCM using temporal keys generated using WPA2/802.11i standard." |
745 | Motorola, Inc. 6480 Via Del Oro San Jose, CA 95199 USA -Zeljko Bajic
-Gopalakrishnan Kamatchi
|
Version 1.0 (Firmware) |
Intel Pentium; RMI-XLR | 2/21/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RFS7000/ WS5100 wireless switches from Motorola provide enhanced support for enterprise mobility and multimedia applications, as well as security and manageability. Switches are based on Motorola’s Wi-NG (Wireless Next Generation) architecture providing support: for a large number of 802.11 a/b/g Access Ports/Points for L2/L3 adoption and mobility; campus wide roaming across subnets, powerful failover capabilities; integrated security features including IPSec VPN gateway and secure guest access." |
744 | Motorola, Inc. 6480 Via Del Oro San Jose, CA 95199 USA -Zeljko Bajic
-Gopalakrishnan Kamatchi
|
Version 3.0.1 (Firmware) |
Intel Pentium; RMI-XLR | 2/21/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "RFS7000/ WS5100 wireless switches from Motorola provide enhanced support for enterprise mobility and multimedia applications, as well as security and manageability. Switches are based on Motorola’s Wi-NG (Wireless Next Generation) architecture providing support: for a large number of 802.11 a/b/g Access Ports/Points for L2/L3 adoption and mobility; campus wide roaming across subnets, powerful failover capabilities; integrated security features including IPSec VPN gateway and secure guest access." |
743 | Senetas Security Pty Ltd Level 1 / 11 Queens Road Melbourne, VIC 3004 Australia -Horst Marcinsky
-Colin Campbell
|
Version 0.9.7 (Firmware) |
Motorola Freescale MPC8280 (PPC32) | 2/21/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Senetas Security's CypherNET™ Crypto library provides FIPS 140-2 approved cryptographic algorithms for the CypherNET family of products. Based on OpenSSL, the CypherNET Crypto library provides an Application Programming Interface (API) to support security relevant services within the CypherNET 1000 and 3000 Series products." 04/04/08: Add tested SHA-256; |
742 | Motorola, Inc. 6480 Via Del Oro San Jose, CA 95199 USA -Zeljko Bajic
-Gopalakrishnan Kamatchi
|
Part # 1.0 |
N/A | 2/21/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Designed for large scale, high bandwidth deployments, the RFS7000 Wireless Switch from Motorola provides robust, highly scalable support for seamless enterprise mobility. Motorola’s Wi-NG architecture, optimized for enterprise mobility and multimedia applications, simplifies network deployment and management, provides superior performance, security and scalability, and supports emerging RF technologies. Built on this platform, the RFS7000 enables campus wide roaming across subnets, and offers powerful failover capabilities, exceptional quality of service (QoS) and increased voice capacity. Integrated security features include IPSec VPN gateway and secure guest access. The RFS7000 supports 256 802.11 a/b/g Access Ports/Points for L2/L3 adoption and mobility, i.e. 8000 users per switch, and 96000 users, when configured in a cluster. Above listed crypto library is used by RFS7000 for implementation of the security features." |
741 | Trust Digital 1760 Old Meadow Rd. Suite 550 n/a McLean, VA 22102 USA -Bill Supernor
|
Version 1.0 |
ARM1136EJ-S RISC processor w/ Windows Mobile 6.0 | 2/21/2008 |
SHA-1     
(BYTE-only) "Award winning Trusted Mobility Server allows an organization to centrally manage an unlimited number of PDA handheld or wireless devices. Access control, encryption, Data Wipe and many more device functionality can all be set and pushed to the device. Trust Digital offers security for Palm, Pocket PC, Blackberry (RIM), Symbian and all windows OSs." |
740 | Nortel Networks 600 Technology Park Billerica, MA 01821 USA -Dave Norton
-Dragan Grebovich
|
Version 7_11.101 |
Intel Pentium 4 w/ Windows XP Professional SP2 | 2/21/2008 |
SHA-1     
(BYTE-only) "The Nortel VPN Client provides stable, secure network access via Nortel VPN routers and VPN gateways. The client can be preconfigured and customized by IT administrators for quick install and connect, or easily configured by end users via the connection wizard." 06/13/08: Update version number; |
739 | Nortel Networks 600 Technology Park Billerica, MA 01821 USA -Dave Norton
-Dragan Grebovich
|
Version 7_05.100 |
Intel Celeron w/ VxWorks 5.3.1; Intel Pentium III w/ VxWorks 5.3.1; Intel Xeon w/ VxWorks 5.3.1 | 2/21/2008 |
SHA-1     
(BYTE-only) "Nortel VPN Routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity for secure connectivity across managed networks and the Internet. They connect remote users, branch offices, suppliers, and customers with cost and performance advantages of public networks and security/control of private networks" |
738 | Nortel Networks 600 Technology Park Billerica, MA 01821 USA -Dave Norton
-Dragan Grebovich
|
Version 7_05.100 |
Intel Celeron w/ VxWorks 5.3.1; Intel Pentium III w/ VxWorks 5.3.1; VxWorks 5.3.1 w/ VxWorks 5.3.1 | 2/21/2008 |
SHA-1     
(BYTE-only) "It is OpenSSL 9.8d based, modified to meet FIPS 140-2 requirements. Nortel VPN Routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity for secure connectivity across managed IP networks and the Internet." |
737 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tony Ureche
|
Version 6.0.6000.16386 |
Intel Pentium D w/ Windows Vista Ultimate (x86); Intel Pentium D w/ Windows Vista Ultimate (x64) | 2/21/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "BitLocker(TM) is a security feature in Windows Vista® that provides full volume encryption to address lost or stolen computer scenarios." |
736 | Oracle Corporation 500 Eldorado Blvd., Bldg 5 Broomfield, CO 80021 USA -David Hostetter
|
Version 1.0 (Firmware) |
ARM926EJ | 2/21/2008 |
SHA-1     
(BYTE-only) "The Sun T10000 Encrypting Tape Drive uses the SHA-1 hashing function as required by RSASSA-PKCS1-v1_5 and for protection of user names and passwords. The Sun T10000 Encrypting Tape Drive uses RSASSA-PKCS1-v1_5 for firmware image signature verification." 12/04/08: Update vendor and implementation information; |
735 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeff Ward
|
Version NGX (R65) HFA-02 (Firmware) |
Intel Core 2 Xeon Quad Core; Intel Core Xeon LV Dual Core | 2/21/2008 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 module running on Nokia's IPSO security hardened operating system " |
734 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version 4.2 (Firmware) |
Intel Core 2 Xeon Quad Core; Intel Core Xeon LV Dual Core | 2/21/2008 |
SHA-1     
(BYTE-only) "Nokia security hardened operating system" |
733 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 5.0.1 |
Cavium OCTEON CN3860 NSP w/ SonicOS Version 5.0.1 | 1/30/2008 |
SHA-1     
(BYTE-only) "The SonicWALL E-Class Network Security Appliance (NSA) E7500 is engineered to meet the needs of the expanding enterprise network by providing a high performance, scalable, multifunction threat prevention appliance." |
732 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 5.0.1 |
Cavium OCTEON CN3860 SCP w/ SonicOS Version 5.0.1 | 1/30/2008 |
SHA-1     
(BYTE-only) "The SonicWALL E-Class Network Security Appliance (NSA) E6500 is engineered to meet the needs of the expanding enterprise network by providing a high performance, scalable, multifunction threat prevention appliance." |
731 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 5.0.1 |
Cavium OCTEON CN3840 SCP w/ SonicOS Version 5.0.1 | 1/30/2008 |
SHA-1     
(BYTE-only) "SonicWALL's E-Class Network Security Appliance (NSA) Series are multi-core Unified Threat Management appliances that combine a powerful deep packet inspection firewall with layers of protection technology and a suite of high-availability features making it the ideal choice for campus networks, data centers and more." |
730 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 5.0.1 |
Cavium OCTEON CN3830 SCP w/ SonicOS Version 5.0.1 | 1/30/2008 |
SHA-1     
(BYTE-only) "The SonicWALL NSA 3500 is a next generation United Threat Management firewall, utilizing a breakthrough multi-core hardware design with 4 cores and 6 GE interfaces to deliver real-time internal and external network protection without compromising network performance for corporate, branch office and distributed environments." |
729 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 5.0.1 |
MIPS Processor Nitrox CN 210 w/ SonicOS Version 5.0.1 | 1/30/2008 |
SHA-1     
(BYTE-only) "SonicWALL's TZ Series is a network security platform that combines a deep packet inspection firewall, anti-virus, anti-spyware, intrusion prevention, content filtering, 56k modem backup, and 802.11 b/g WLAN, which allow small and branch offices to implement protection against the wide spectrum of emerging network threats." |
728 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 1.1 (Firmware) |
MPC824X | 1/30/2008 |
SHA-1     
(BYTE-only) "Cryptographic Firmware Library provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. Firmware library provides implementations for TDES, AES, SHA1, HMAC, RSA, and RNG(ANSI X9.31)" |
727 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version Version 0.9.8E |
Intel Core2 T5500, 1.66GHz w/ Windows XP; Pentium 4, 2.30 GHz w/ Windows 2000 | 1/30/2008 |
SHA-1     
(BYTE-only) "This is the SHA algorithm implementation for the Cisco Secure Services Client FIPS Module. The Cisco Secure Services Client FIPS module is a self contained crypto module that supports IEEE 802.11i security (WPA2) along with secure EAP types such as EAP-TLS, EAP-FAST, and PEAP while operating in FIPS 140-2 mode." |
726 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 5.0 (Firmware) |
AMD Alchemy MIPS Processor | 1/30/2008 |
SHA-1     
(BYTE-only) SHA-384  (BYTE-only) "The Fortress Suite of Algorthms (AES, SHS, HMAC and RNG) will execute on a Secure Wireless Access Bridge (SWAB) to provides security to the corporate network by protecting communications between wireless devices and the rest of the network." |
725 | Authernative, Inc. 201 Redwood Shores Parkway Suite 275 n/a Redwood City, CA 94065 USA -Len. L. Mizrah
|
Version 1.0.0 |
Intel Pentium 4 w/ Windows XP Professional SP2 with Sun JDK 1.5 | 1/30/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Authernative Cryptographic Module is a software cryptographic module that is implemented as a software library. This software library provides cryptographic services for all Authernative products. The module provides FIPS-Approved cryptographic services for encryption, decryption, key generation, secure hashing, and random number generation." |
724 | Inovis USA, Inc. 18300 Von Karman Avenue Suite 800 n/a Irvine, CA 92612 USA -Ryan B Saldanha
-Hatem El-Sebaaly
|
Version 1.01 |
Intel Pentium 4 w/ WindowsXP SP2 | 1/30/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) Does not support the hashing of NULL messages "Implementation of a JCE provider conforming to version 1.2 of the JCE spec." |
723 | Open Source Software Institute 8 Woodstone Plaza, Suite 101 Hattiesburg, MS 39402 USA -John Weathersby
-Steve Marquess
|
Version 1.2 |
Intel Pentium 4 w/ Windows XP SP2; Intel Core 2 Duo w/ Windows XP 64 bit; Intel Pentium 4 w/ OpenSuSE 10.2; Intel Core 2 Duo w/ OpenSuSE 10.2 64 bit; ARM922 w/ µClinux (Linux Kernel Version: 2.4.32) | 1/30/2008 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website. It has been tested with both assembler optimization and without assembler optimization." 01/27/02: Add new OES'; |
722 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 5.0 (Firmware) |
Xilinx Spartan FPGA | 1/17/2008 |
SHA-256 
(BYTE-only) SHA-512  (BYTE-only) "The Fortress SWAB provides authenticated, encrypted communication on a Fortress-secured network." |
721 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 (Firmware) |
Xilinx Spartan FPGA | 1/17/2008 |
SHA-1     
(BYTE-only) "Provides Fortress ES520 cryptographic services through the Xilinx Spartan FPGA." |
720 | CoCo Communications Corp. 101 Elliott Ave W. #410 Seattle, WA 98119 USA -Jason Tucker
-Pete Erickson
|
Version 1.0 |
Intel Celeron w/ Debian Linux 4.0 (Etch); Intel Pentium 4 w/ Windows XP Professional SP2 | 1/17/2008 |
SHA-1     
(BYTE-only) "OpenSSL-based algorithm implementations used by the CoCo Crypto cryptographic library." |
719 | L-3 Communications Linkabit 3033 Science Park Road San Diego, CA 92121 USA -Rick Roane
|
Version TF1-SSH-VX-SRC-2-0-0-001 |
MPC7448 PowerPC G4 w/ VxWorks 5.5 | 1/17/2008 |
SHA-1     
(BYTE-only) "MPM-1000 SATCOM IP Modem" |
718 | STMicroelectronics 15 Enterprise, suite 300 Aliso Viejo, CA 92656 n/a -Arnaud Pate-Cazal
|
Part # ST-HC-SHA-01, Version 1.0 |
N/A | 1/17/2008 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The STM HardCache is a secure SOC used for Access Control and Data Storage Encryption. It integrates a dedicated RISC processor coupled with a HW accelerated Cryptographic Engine that implements AES 128/192/256 (ECB/CBC/CTR modes), SHA-1/256, HMAC-SHA-1/256, RSA PKCS#1 ver2.1 and ANSI x9.31 DRNG." |
717 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.1.1 (Firmware) |
AMD Alchemy MIPS Processor | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Fortress SWAB provides authenticated, encrypted communication on a Fortress-secured network." |
716 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.1 |
X86-compatible w/ Windows 2003 Server; X86-compatible w/ Red Hat Enterprise Linux 4; X86-compatible w/ Suse Enterprise Linux 10; X86-compatible w/ Windows XP | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "A software cryptographic module supporting encryption, authentication, and data redundancy techniques running on either Linux or Windows user or kernel modes." |
715 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 5.0 (Firmware) |
AMD Alchemy MIPS Processor | 12/31/2007 |
SHA-384 
(BYTE-only) "The Fortress SWAB provides authenticated, encrypted communication on a Fortress-secured network." |
714 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 2.6.10 (Firmware) |
Alchemy Au1550 MIPS Processor | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress SWAB ES520 provides authenticated, encrypted communication on a Fortress-secured network." |
713 | nCipher Corporation Ltd. Jupiter House, Station Road Cambridge, CB1 2JD United Kingdom -Marcus Streets
-Mark Wooding
|
Version 5.0 (Firmware) |
Motorola Power PC | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's nShield Hardware Security Modules." |
712 | Open Source Software institute 3610 Pearl Street Hattiesburg, MS 39401 US -John Weathersby
|
Version 1.2 |
AMD dual core Athlon 64 processor w/ Windows XP SP2 | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Runtime Module is a cryptographic library designed for use with the OpenSSL toolkit on multiple platforms." |
711 | Open Source Software institute 3610 Pearl Street Hattiesburg, MS 39401 US -John Weathersby
|
Version 1.2 |
AMD dual core Athlon 64 processor w/ Fedora Core 7 | 12/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Runtime Module is a cryptographic library designed for use with the OpenSSL toolkit on multiple platforms" |
710 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Jon Seanor
|
Version 3.0 |
Intel Pentium IV w/ Windows XP Pro SP2 | 12/31/2007 |
SHA-1     
(BYTE-only) "FortiClient fortips.sys Cryptolibrary v3.0 - The fortips.sys library provides the following services for the FortiClient product: HMAC, SHA1, AES CBC, AES ECB, 3DES. Fortips.sys is a kernel mode device driver that appears as a "Fortinet Virtual Adapter" in the network interfaces list." 01/08/08: Update implementation name and OEs; |
709 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Jon Seanor
|
Version 3.0 |
Intel Pentium IV w/ Windows XP Pro SP2 | 12/31/2007 |
SHA-1     
(BYTE-only) "FortiClient Cryptolib.dll Cryptolibrary v3.0 - The Cryptolib library provides the following services for the FortiClient product: RNG, HMAC, SHA1, AES CBC, AES ECB, 3DES. Cryptolib.dll is a user mode application that serves as a wrapper for two other dlls: libeay32.dll and ssleay32.dll." 01/08/08: Update implementation name and OEs; |
708 | Alcatel-Lucent 600 - 700 Mountain Avenue Murray Hill, NJ 07974 USA -Paul Fowler
|
Version 2.1 |
AMD Geode GX w/ Inferno 9.1; Intel Celeron w/ Inferno 9.1; Intel Pentium 4 w/ Inferno 9.1 | 12/31/2007 |
SHA-1     
(BYTE-only) "Alcatel-Lucent VPN Firewall Brick is a high-speed packet-processing appliance oriented towards providing security functions. The Bricks are carrier-grade integrated firewall and VPN gateway appliance specifically designed for web/application data center security, large-scale managed security services, and remote access VPN services." |
707 | Optica Technologies Inc. 2051 Dogwood St Suite 210 n/a Louisville, CO 80027 USA -William Colvin
-Gil Fisher
|
Version 1.3.1.0 (Firmware) |
Intel Xeon processor | 12/17/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Eclipz ESCON tape encryptor is designed to be inserted in an ESCON fiber optic channel between an IBM mainframe computer and a a tape drive to encrypt data being sent to the tape drive." |
706 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 2.1.0.3 |
Intel Pentium 4 (2.80 GHz) w/ Windows Server 2003 SP1 (32-bit x86 - VS8.0 build) | 12/17/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
705 | Alcatel-Lucent 600 - 700 Mountain Avenue Murray Hill, NJ 07974 USA -Paul Fowler
|
Version 2.1 |
AMD Geode GX w/ Inferno 9.1; Intel Celeron w/ Inferno 9.1; Intel Pentium 4 w/ Inferno 9.1 | 12/17/2007 |
SHA-1     
(BYTE-only) "Alcatel-Lucent VPN Firewall Brick is a high-speed packet-processing appliance oriented towards providing security functions. The Bricks are carrier-grade integrated firewall and VPN gateway appliance specifically designed for web/application data center security, large-scale managed security services, and remote access VPN services." |
704 | Alcatel-Lucent 600 - 700 Mountain Avenue Murray Hill, NJ 07974 USA -Paul Fowler
|
Part # 1.0 |
N/A | 12/17/2007 |
SHA-1     
(BYTE-only) "Hifn 7954 AES, HMAC, SHA-1, and Triple-DES implementations. The Hifn 7954 accelerator card is used in Alcatel-Lucent VPN Firewall Bricks." |
703 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Helen Francis
|
Version 4.0 |
Intel Pentium M w/ Windows XP SP2 Professional with Sun Java JRE 1.4.2; Intel Pentium M w/ Windows XP SP2 Professional with Sun Java JRE 1.5.0; Intel Pentium M w/ Windows XP SP2 Professional with Sun Java JRE 1.6.0 | 12/17/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." |
702 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Helen Francis
|
Version 4.0 |
Intel Pentium M w/ Windows XP SP2 Professional with Sun Java JRE 1.4.2; Intel Pentium M w/ Windows XP SP2 Professional with Sun Java JRE 1.5.0; Intel Pentium w/ Windows XP SP2 Professional with Sun Java JRE 1.6.0 | 12/17/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." |
701 | Open Source Software Institute Administrative Office P.O. Box 547 Oxford, MS 38655 USA -John Weathersby
|
Version 1.1.2 |
Intel Pentium 4 w/ SUSE Linux 10.2 | 12/17/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website." |
700 | BeCrypt Ltd. Wyvols Court Swallowfield Reading, Berkshire RG7 1WY UK -Pali Surdhar
|
Version 1.0 |
X86 based processors w/ Real mode pre-boot environment | 11/30/2007 |
SHA-256 
(BYTE-only) "Becrypt realmode pre-boot implementation of FIPS certified algorithms for use within Becrypt's Product Set for Enterprise Data Security Solutions" |
699 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Juan Asenjo
|
Version 1.4.3.1 (Firmware) |
Motorola Coldfire | 11/30/2007 |
SHA-1     
(BYTE-only) "The DatacryptorR 2000 and the DatacryptorR Advanced Performance Cryptographic Modules secure communications using signed Diffie-Hellman key exchange and Triple-DES or AES encryption over point to point link (including E1/T1, E3/T3), Frame Relay, and IP (up to 100 Mbps) networks" |
698 | Guidance Software, Inc. 215 North Marengo Avenue, Suite 250 Pasadena, CA 91101 USA -Ken Basore
|
Version 1.0 |
Intel Pentium 4 w/ Windows XP Pro SP2 | 11/30/2007 |
SHA-1     
(BYTE-only) "EnCase® Enterprise provides complete network visibility, immediate response and comprehensive, forensic-level analysis of servers and workstations anywhere on a network. The solution can securely investigate/analyze many machines simultaneously over the LAN/WAN at the disk and memory level." |
697 | Mocana Corporation 710 Sansome Street San Francisco, CA 94104 USA -James Blaisdell
|
Version 4.2f |
Freescale Dragonball MXL w/ Windows CE 4.2; Freescale Coldfire MCF5235 w/ uCLinux 2.4; Intel XScale PXA255 w/ Gumstix 2.6; Intel Core 2 Duo w/ Linux 2.6; Broadcom 1103 w/ VxWorks 5.5 | 11/30/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Mocana Cryptographic Module is used in conjuction with Mocana's scalable, high performance embedded security solutions. These include: Mocana EAP supplicant/authenticator, Mocana SSL/TLS Client & Server and Mocana IPsec/IKE." 05/29/09: Update implementation version and add new tested OES; |
696 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Basavaraj Bendigeri
|
Version 3.2 (2c) |
PowerPC 7447A/7448 w/ MontaVista Linux (2.4.2 Kernel) | 11/30/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "These are the cryptographic algorithm implementations for the Supervisor 2 modules which are used with Cisco MDS 9500 Series switches." 12/05/07: Update version number; |
695 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Basavaraj Bendigeri
|
Version 3.2 (2c) |
MontaVista Linux (2.4.2 Kernel) w/ Intel PIII Tualatin | 11/30/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "These are the cryptographic algorithm implementations for the Supervisor 1 modules which are used with Cisco MDS 9500 Series switches and Cisco MDS 9216i switch." 12/05/07: Update version number; |
694 | Credant Technologies Inc. 15303 N Dallas Parkway Suite 1420 Addison, TX 75001 US -Chris Burchett
|
Version 1.7 |
AMD Athlon 64x2 w/ Windows XP; AMD Athlon 64x2 w/ Windows Vista | 11/30/2007 |
SHA-1     
(BYTE-only) "Credant Cryptographic Kernel is a FIPS 140-2 compliant, software based cryptography library that implements Triple-DES, AES, SHA-1, HMAC, and ANSI X9.31 RNG algorithms for the Credant Mobile Guardian product. Credant Mobile Guardian enables enterprise-wide control of security for mobile and wireless users of laptops, tablet PC's, PDA's, and SP's." |
693 | Motorola, Inc. 1150 Kifer Road Sunnyvale, CA 94086-5312 USA -Ashot Andreasyan
|
Part # MPC184VMB Version B |
N/A | 11/6/2007 |
SHA-1     
(BYTE-only) The SHA-1 Short Message Test does not support the null message "The MPC184VMB chip is used in S2500 routers for encrypting and authenticating data path traffic." |
692 | IBM Corporation Nymollevej 91 Lyngby, DK-2800 Denmark -Crypto Competence Center Copenhagen
|
Version 4.2.FIPS |
AMD Athlon64 X2 4000+ w/ Windows Vista with Sun Java JRE 1.6.0 | 11/6/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM CryptoLite for Java (CLiJ) v4 is a Java Cryptographic Extension (JCE) compliant cross-platform software library which provides APIs for the cryptographic functions specified in NSA Suite B." |
691 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Part # 294.001, Version 1.0 |
N/A | 11/30/2007 |
SHA-256 
(BYTE-only) "The IronKey Secure Flash Drive includes a high-speed hardware-based AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, SHA-256, SHA-1 and RNG algorithms." 10/19/11: Update vendor information; |
690 | Credant Technologies Inc. 15303 N Dallas Parkway Suite 1420 Addison, TX 75001 US -Chris Burchett
|
Version 1.7 |
TI OMAP 710 ARM-926 w/ Symbian Series 60; Intel PXA 270 X Scale ARM w/ Windows Mobile 5.0; TI OMAP 2420 ARM w/ Windows Mobile 6.0 | 11/6/2007 |
SHA-1     
(BYTE-only) "Credant Cryptographic Kernel is a FIPS 140-2 compliant software based cryptographic library that implements 3DES, AES, SHA-1, HMAC, and ANSI X9.31 RNG algorithms for the Credant Mobile Guardian product. Credant Mobile Guardian enables enterprise-wide control of security for mobile and wireless users of laptops, tablet PC's, PDA's and smart phones." |
689 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Part # 294.004, Version 1.0 |
N/A | 11/6/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The IronKey Secure Flash Drive includes a high-speed hardware-based AES cryptography engine for encrypting and decrypting NAND flash and RAM buffers via USB. It also includes RSA, SHA-256, SHA-1 and RNG algorithms." 10/19/11: Update vendor information; |
688 | Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version ID-One Cosmo Version F310 (Firmware) Part # B0 |
ID-One Cosmo 128 v5.5 | 11/6/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The ID-One Cosmo Smart Card Platform is a single chip multi-application cryptographic module that offers a highly secure architecture together with cryptographic services such as 3DES (128,192), AES (128,192,256), RSA (1024,1536,2048) with onboard key generation, SHA (1,224,256,384,521), ECDSA (GFP,192,224,256,384) Elliptic Curve Diffie-Hellman." |
687 | Keycorp Limited Level 5, Keycorp Tower 799 Pacific Highway Chatswood NSW Sydney, Austrailia 2067 Australia -Graeme Bradford
|
Version 1.0 (Firmware) |
Infineon SLE66CLX800PEM crypto controller | 11/6/2007 |
SHA-1     
(BYTE-only) "The Keycorp MULTOS I4F 80K Smart Card with MULTOS PIV Card Application can be employed in a wide range of solutions. The smart card provides a highly portable, secure token for enhancing the security of network access and ensuring secure electronic communications. Combined with the PIV Card Application it provides enhanced I&A functionality." |
686 | Hewlett-Packard Company 19091 Pruneridge Ave. MS 4441 Cupertino, CA 95014 USA -Jane Blanchard
|
Version 1.0 |
Dual-Core Intel Xeon 5160 w/ CentOS v4.3 | 10/23/2007 |
SHA-1     
(BYTE-only) "The HP Secure Key Manager automates encryption key generation and management. It is a hardened security appliance delivering identity-based access, administration and logging. Additionally, the Secure Key Manager provides reliable lifetime key archival with automatic multi-site key replication and failover capabilities." 12/18/07: Update implementation description; |
685 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Version 1.0 (Firmware) |
MPC824X | 10/23/2007 |
SHA-1     
(BYTE-only) "Cryptographic Firmware Library provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. Firmware library provides implementations for TDES, AES, SHA1, HMAC, RSA, and RNG(ANSI X9.31)" |
684 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Part # 1010120 |
N/A | 10/23/2007 |
SHA-1     
(BYTE-only) "Cryptographic hardware implementation provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. The Hardware provides implementations for TDES, AES, SHA1, HMAC, RSA, RNG(ANSI X9.31), and AES-CCM." |
683 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Part # 1010199 |
N/A | 10/23/2007 |
SHA-1     
(BYTE-only) "Cryptographic hardware implementation provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. The Hardware provides implementations for TDES, AES, SHA1, HMAC, RSA, RNG(ANSI X9.31), and AES-CCM." |
682 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Harsha Nagaraja
|
Part # 1010254 |
N/A | 10/23/2007 |
SHA-1     
(BYTE-only) "Cryptographic hardware implementation provides cryptographic algorithm implementations for purpose built Aruba's Mobility controller. The Hardware provides implementations for TDES, AES, SHA1, HMAC, RSA, RNG(ANSI X9.31), and AES-CCM." |
681 | AEP Networks Focus 31, West Wing Cleveland Road Hemel Hempstead, Herts HP2 7BW UK -David Miller
-Rod Saunders
|
Version 010837 v2 rel 7 (Firmware) |
Motorola PowerPC 866 | 10/15/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The AEP Networks Advanced Configurable Crypto Environment (ACCE) provides highly secure cryptographic services and key storage. It is used in a range of AEP systems and OEM products including the SureWare keyper family." |
680 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version 0107.7099.0105 (Firmware) Part # AT90SC12872RCFT Rev M |
Atmel AT90SC12872RCFT | 10/15/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "IDProtect is a cryptographic module based on the Athena OS755 Java Card smart card operating system. IDProtect is compliant with the latest Java Card 2.2.2 and Global Platform 2.1.1 specifications and FIPS 140-2 Level 3 (Level 4 Physical Security). IDProtect supports FIPS approved RNG, TDES, AES, SHA-1, SHA-256, and RSA up to 2048 bits." |
679 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 2.1.0.2 |
PowerPC Power3 w/ AIX 5.2 (32-bit); PowerPC Power3 w/ AIX 5.2 (64-bit); PowerPC Power5 w/ AIX 5.3 (32-bit); PowerPC Power5 w/ AIX 5.3 (64-bit); Intel Celeron w/ Red Hat Enterprise Linux v4.0 (32-bit, x86); Intel Pentium D w/ Red Hat Enterprise Linux v4.0 (64-bit, x86_64); Intel Itanium2 w/ HP-UX 11.23 (32-bit); Intel Itanium2 w/ HP-UX 11.23 (64-bit); PA-RISC 2.0 w/ HP-UX 11.11 (32-bit); PA-RISC 2.0W w/ HP-UX 11.23 (64-bit); SPARC v8 w/ Solaris 10 (32-bit); SPARC v8+ w/ Solaris 10 (32-bit); SPARC v9 w/ Solaris 10 (64-bit); AMD Opteron w/ Solaris 10 (64-bit); Intel Pentium 4 w/ Suse Linux Enterprise Server 9.0 (32-bit); AMD Opteron w/ SuSE Linux Enterprise Server 9.0 (64-bit); Motorola MPC 7455 w/ VxWorks 5.4 (PowerPC 604); Motorola MPC 8260 w/ VxWorks 5.5 (PowerPC 603); Motorola MPC 7455 w/ VxWorks 5.5 (Power PC 604); Motorola MPC 7457 w/ VxWorks General Purpose Platform 6.0 (PowerPC 604); Intel Celeron w/ Windows 2003 Server SP1 (Compiled with MS VC 6.0); Intel Pentium 4 w/ Windows 2003 Server SP1 (Compiled with MS VC 8.0); Intel Itanium2 w/ Windows 2003 Server SP1; AMD Athlon64 X2 4000+ w/ Windows 2003 Server SP1 (64-bit, x86_64); Intel PXA270 w/ Windows Mobile 5.0; TI OMAP 850 w/ Windows Mobile 5.0 Phone Edition; TI OMAP 1510 w/ Windows Mobile 2003 Phone Edition; Intel PXA250 w/ Windows Mobile 2003 | 9/27/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
678 | SanDisk Corporation 601 McCarthy Boulevard Milpitas, CA 95035 USA -Rotem Sela
|
Version 1.0 (Firmware) |
SanDisk Controller Chip | 9/27/2007 |
SHA-1     
(BYTE-only) "TrustedFlash(TM) v1.0 - microSD is SanDisk's proprietary TrustedFlash v1.0 advanced security technology. It implements FIPS-Approved algorithms including AES, Triple-DES, RSA, SHA, HMAC, and ANSI X9.31 RNG. They provide authentication, data encryption/decryption, and signature generation/verification functions for TrustedFlash(TM) v1.0 - microSD." 11/16/07: Corrections were made to implementation name and type; |
677 | Trapeze Networks 5753 W. Las Positas Blvd Pleasanton, CA 94588 USA -Ted Fornoles
|
Version MSS 6.1.0.3 (Firmware) |
Freescale MPC8541E | 9/27/2007 |
SHA-1     
(BYTE-only) "Trapeze Networks delivers Smart Mobile WLAN network solutions, enabling govt. agencies and enterprises to deploy and manage scalable, secure, mobile applications. It supports the IEEE 802.11i security specification and wireless IDS, application-aware switching, location tracking, voice and seamless indoor/outdoor mobility." 01/16/08:Change in Version, OE, and Impl Type |
676 | Trapeze Networks 5753 W. Las Positas Blvd Pleasanton, CA 94588 USA -Ted Fornoles
|
Version MSS 6.1.0.3 (Firmware) |
AMCC 405EP | 9/27/2007 |
SHA-1     
(BYTE-only) "Trapeze Networks delivers Smart Mobile WLAN network solutions, enabling govt. agencies and enterprises to deploy and manage scalable, secure, mobile applications. It supports the IEEE 802.11i security specification and wireless IDS, application-aware switching, location tracking, voice and seamless indoor/outdoor mobility." 01/16/08:Change in Version, OE, and Impl Type |
675 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Ryon Coleman
-Chris Guo
|
Version 1.0 |
Intel Celeron w/ Windows XP SP2 | 9/27/2007 |
SHA-1     
(BYTE-only) "The Cryptographic Kernel Library (CKL) is a software module that implements a set of cryptographic algorithms for use by a software application. The 3eTI CKL is a binary dynamic link library that is compiled from source code written in C, C++ with possible assembly language optimization. This binary library resides in Windows kernel space." |
674 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version 010A.7204.0004 (Firmware) Part # AT90SC144144CT |
Atmel AT90SC144144CT | 9/27/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "IDProtect is a cryptographic module based on the Athena OS755 Java Card 2.2.2 and GlobalPlatform2. 1.1 specifications and F IPS 140-2 Level 3 (Level 4 for physical security).IDProtect supports F IPS approved Random Number Generator, TDES,A ES, SHA-I, SHA-256, and RSA up to 2048 bits including on board key generation." 09/19/07: Update implementation description; |
673 | Harris Corporation 221 Jefferson Ridge Parkway Lynchburg, VA 24501 USA -Dennis L. Warheit
|
Version R1A |
Intel Celeron w/ Windows Server 2003 SP2; Intel Celeron w/ Windows XP Professional SP2; ;  Qualcomm MSM8974 Snapdragon 800 x4 w/ Android Kit Kat 4.4.2; Intel Xeon W3520 w/ Microsoft Windows 7 Enterprise Service Pack 1; Intel Core 2 Duo U7700 w/ Microsoft Windows 8.1 Pro | 9/12/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Harris Corporation Wireless Systems Cryptographic Library is a software-based cryptographic module that provides encryption, authentication, and other security support services to various M/A-Com product applications. It specifically satisfies FIPS 140-2 Level 1 requirements." 06/24/10: Updated vendor and implementation information; |
672 | Tait Electronics Ltd. 175 Roydvale Avenue Christchurch, New Zealand -Werner Hoepf
|
Version 2.0 (Firmware) |
Texas Instruments C55 DSP | 9/12/2007 |
SHA-1     
(BYTE-only) "Firmware Implementation of HMAC SHA-1 used in the Tait Electronics Ltd digital product range" |
671 | IBM 9032 South Rita Road Tucson, AZ 85744 USA |
Version 95P5203 EC level H82669 (Firmware) |
PowerPC 405CR | 9/12/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The TS1120 / 3592 E05 Tape Drive provides full line speed, fully validated, hardware implemented, AES 256 bit encryption and compression of customer data recorded to tape. It ensures data confidentiality in the event of a lost tape while also supporting additional cryptographic functions for authentication and secure transfer of key material." |
670 | CipherMax, Inc. 1975 Concourse Dr. San Jose, CA 95131 USA -Chung Dai
|
Version 5.3.1.0 (Firmware) |
PPC750 | 8/29/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "CipherMax generic crypto library implementation for all storage security systems including CM140T, CM180D, and CM250/500." |
669 | 3e Technologies International, Inc. 9715 Key West Avenue Suite 500 Rockville, MD 20850 USA -Ryon Coleman
|
Version 4.0.10.23 (Firmware) |
Intel XScale | 8/29/2007 |
SHA-1     
(BYTE-only) "The 3eTI Wireless Access Point Cryptographic Firmware Library provides cryptographic algorithm implementations for 3eTI's range of wireless access points. It provides implementations for AES including CCM, TDES, SHA, HMAC, and an approved PRNG." |
668 | Thales e-Security Meadow View House Crendon Industrial Estate Long Crendon Aylesbury, Buckinghamshire HP18 9EQ U.K. -Tim Fox
|
Version 1.0 (Firmware) Part # SGSS Version 3.4 |
SGSS v3.4 | 8/29/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Thales e-Security implements this algorithm for applications running on its Secure Generic Sub-System (SGSS) providing secure cryptographic resources to products in the Thales e-Security portfolio, including the WebSentry™ family, HSM 8000 family, P3™CM family, 3D Security Module, and the SafeSign® Crypto Module." 09/17/07: Update implementation description; |
667 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ben Davis
|
Version 01.01.08 (Firmware) |
IBM PowerPC 405GPr | 8/7/2007 |
SHA-1     
(BYTE-only) "The ViaSat Enhanced Bandwidth Efficient Modem (EBEM-500) series Satcom Modem provides the latest in efficient modulation and coding for point-to-point Satcom connections. The EBEM-500 series offers embedded encryption integrating the security functions into the modem to provide an integrated secure Satcom modem product." |
666 | GlobalSCAPE Texas, LP 6000 Northwest Parkway Suite 100 n/a San Antonio, TX 78249 USA -Mike Hambidge
|
Version 1.0.0, 1.0.1, and 1.0.2 |
Intel® Pentium® 4 w/ Microsoft Windows Server 2003 | 8/7/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The GlobalSCAPE® Cryptographic Module provides cryptographic services for the GlobalSCAPE family of software products such as Secure FTP Server and EFT Server. The services include symmetric/asymmetric encryption/decryption, digital signatures, message digest, message authentication, random number generation, and SSL/TLS support." 11/21/07: Update implementation version; |
665 | LSI Corporation 1501 McCarthy Boulevard Milpitas, CA 95035 USA -Lav Ivanovic
|
Version 1.0 (Firmware) |
Cadence verilog hardware simulator | 8/7/2007 |
SHA-1     
(BIT) SHA-224  (BIT) SHA-256  (BIT) SHA-384  (BIT) SHA-512  (BIT) "Optimized hardware cryptographic module used in custom silicon implementations which need to support security applications." |
664 | Hughes Network Systems, LLC. 11717 Exploration Lane Germantown, MD 20876 USA -Vivek Gupta
|
Version 1.2 |
Toshiba TMPR4955B-300 w/ Wind River VxWorks 5.4; Intel® Pentium® 4 w/ Microsoft Windows Server 2003 | 7/31/2007 |
SHA-1     
(BYTE-only) "The Hughes Crypto Kernel (HCK) for Hughes HN and HX systems enables end-to-end bidirectional encryption between a remote site and the enterprise data center, while still allowing the use of satellite acceleration and other HN and HX features. The HCK uses AES for encryption and IKE to auto-generate and refresh session keys." |
663 | IBM Corporation Nymollevej 91 Lyngby, DK-2800 Denmark -Crypto Competence Center Copenhagen
|
Version 4.5 |
Intel Celeron w/ Windows Vista Ultimate; Intel Celeron w/ Red Hat Enterprise Linux v4 | 7/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM CryptoLite for C (CLiC) is a C software package providing advanced cryptographic services in a configurable footprint. CLiC supports NSA Suite B encryption and ordinary public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic services with a simple programming interface." |
662 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Version 3.1 (Firmware) |
Intel x86 | 7/23/2007 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FIPS Cryptographic Library v3.1 runs on an Intel x86 compatible processor using the FortiOS." |
661 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Version 3.1 (Firmware) |
Intel x86 | 7/23/2007 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet SSL Cryptographic Library v3.1 runs on an Intel x86 compatible processor using the FortiOS." |
660 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Part # CP-6 |
N/A | 7/23/2007 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-6" |
659 | Motorola, Inc. 1150 Kifer Road Sunnyvale, CA 94086-5312 USA -Ashot Andreasyan
|
Version OpenSSL0.9.8b |
MPC862 w/ Enterprise OS | 7/23/2007 |
SHA-1     
(BYTE-only) "The crypto component of OpenSSL0.9.8 library is used for providing crypto operations on the MPC862 platform-S2500 router. It is used for encrypting critical security parameters and protocol messages, calculating message digest, authenticating a user, and generating cryptographic keys and key encryption keys." |
658 | Motorola, Inc. 1150 Kifer Road Sunnyvale, CA 94086-5312 USA -Ashot Andreasyan
|
Version OpenSSL0.9.8b |
MPC7457 w/ Enterprise OS | 7/23/2007 |
SHA-1     
(BYTE-only) "The crypto component of OpenSSL0.9.8 libarary is used for providing crypto operations on the MPC7457 platform-S6000 router. It is used for encrypting critical security parameters and protocol messages, calculating message digest, authenticating a user, and generating cryptographic keys and key encryption keys." |
657 | Oracle Building 510 TVP Oracle Corporation Thames Valley Park Reading, Berkshire RG6 1RA UK -Shaun Lee
|
Version 10.1.0.5 |
Sun UltraSparc dual processor w/ Sun Solaris 8.0 | 7/23/2007 |
SHA-1     
(BYTE-only) "The Oracle Cryptographic Libraries for SSL 10g is a generic module used by the Oracle Corporation to provide cryptography, authentication, PCS and certificate mangagement in a variety of its application suites." |
656 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 3.1 |
Pentium III w/ Windows 2000 Professional SP4; Pentium IV w/ Windows XP Professional SP2; Pentium III w/ Windows 2003 Server SP2; Intel PXA250 w/ Windows CE 3.0; Intel PXA263 w/ Windows CE 4.0; Intel PXA27x w/ Windows CE 5.0 | 7/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Secure Client is a software module designed to deliver security on wireless devices such as bar scanners, handhelds, and laptops using various operating systems. A plug-and-play solution, the Client encrypts and decrypts communication across the WLAN and protects the device against attacks without user intervention." |
655 | Sterling Commerce, Inc. 4600 Lakehurst Court Dublin, Ohio 43016-2000 USA -Shryl Tidmore
-Terrence Shaw
|
Version 1.0, 1.4, and 1.5 |
Intel® Itanium® 2 w/ HP-UX 11iV2; HP PA-8700 w/ HP-UX 11iV2; Motorola PowerPC® Power5 w/ IBM AIX 5L(TM) 5.3; Sun UltraSPARC® II w/ Sun Solaris 10; Intel® Pentium® III w/ Microsoft Windows Server 2003 | 7/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Sterling Crypto-C is a software module implemented as two dynamic libraries. Sterling Crypto-C provides security capabilities, such as encryption, authentication, and signature generation and verification for Sterling Commerce’s managed file transfer solutions." 11/20/07: Update implementation version; |
654 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8a-18.15 |
IBM z/Architecture w/ SUSE Linux Enterprise Linux 10 Service Pack 1 | 7/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA implemented on SLES10" |
653 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8a-18.15 |
IBM POWER5 w/ SUSE Linux Enterprise Linux 10 Service Pack 1 | 7/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA implemented on SLES10" |
652 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8a-18.15 |
AMD Opteron w/ SUSE Linux Enterprise Linux 10 Service Pack 1 | 7/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA implemented on SLES10" |
651 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8a-18.15 |
Intel Xeon EM64T w/ SUSE Linux Enterprise Linux 10 Service Pack 1 | 7/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA implemented on SLES10" |
650 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Part # 1R84000, Version A |
N/A | 7/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Pitney Bowes Cygnus X-3 Postal Security Device (PSD) complies with FIPS 140-2 and IPMAR standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
649 | TriCipher, Inc. 12007 Sunrise Valley Drive Suite 355 Reston, VA 20191 USA -Douglas Song
|
Version 3.9 |
Intel Pentium 4 w/ Windows XP; Intel Pentium 4 w/ Sun JDS Linux 2.4.19 | 7/23/2007 |
SHA-1     
(BYTE-only) "The Common Core Library provides an interface to the client developers for crypto programming and supports TriCipher's Client software during normal crypto operations." |
648 | nCipher Corporation Ltd. Jupiter House, Station Road Cambridge, CB1 2JD United Kingdom -Marcus Streets
-Mark Wooding
|
Version 5.0 (Firmware) |
Motorola Power PC | 7/23/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's nShield Hardware Security Modules." |
647 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Y.J. Kim
|
Part # CN3600/CN3800 Version 3.1 |
N/A | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN36XX/CN38XX - SCP, NSP family of multi-core MIPS64 processors targets intelligent, multi-gigabit networking, control plane, storage and wireless applications. This processor family includes part numbers CN3630SCP, CN3630NSP, CN3830SCP, CN3830NSP, CN3840SCP, CN3840NSP, CN3850SCP, CN3850NSP, CN3860SCP, and CN3860NSP." 10/15/07: Update implementation description; |
646 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Y.J. Kim
|
Part # CN3100, Version 1.1 |
N/A | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN31XX - SCP, NSP family of single & multi-core MIPS64 processors targets intelligent, gigabit networking, control plane, storage and wireless applications. This processor family includes part numbers CN3110SCP, CN3110NSP, CN3120SCP, CN3120NSP, and CN3020SCP." 10/15/07: Update implementation description; |
645 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Y.J. Kim
|
Part # CN3000, Version 1.1 |
N/A | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "OCTEON CN30XX - SCP family of single core MIPS64 processors targets intelligent networking, control plane, storage and wireless applications. This processor family includes part numbers CN3005SCP and CN3010SCP. CPU integrates security HW acceleration including AES-GCM, SHA-2 (up to SHA-512)." 10/15/07: Update implementation description; |
644 | CardLogix 16 Hughes, Suite 100 Irvine, CA 92618 USA -Ken Indorf
|
Version 07.0107.04 (Firmware) Part # AT90SC12872RCFT Rev. J |
Atmel AT90SC12872RCFT | 7/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "CREDENTSYS-J is a secure smart card that is designed for National ID systems and multi-use enterprise security environments. The CREDENTSYS-J card is based on Java Card tm 2.2.1 and Global Platform 2.1.1 architectures and is readily deployable into existing or new PKI environments. CREDENTSYS cards offer a combination of high performance and cost" |
643 | Masabi Ltd 45 Great Guildford Street London, London SE1 0ES United Kingdom -Ben Whitaker
|
Version 1.0 |
ARM9 w/ Nokia OS (J2ME/MIDP on Nokia 6230i Series 40) w/ Java | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A security system offering RSA key exchange, AES encryption and random number generation for Java enabled mobile phones." |
642 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Manfield
|
Version 4.1.171.0 (Firmware) |
IBM 405GP PowerPC | 7/2/2007 |
SHA-1     
(BYTE-only) "The Cisco LWAPP Aironet 1131, 1242 access points deliver the versatility, high capacity, security, and enterprise-class features required for small, medium and large Government deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and Advanced Encryption Standard (AES) for WPA2 encryption." |
641 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 4.0 S (Firmware) |
ARM 920T; ARM926EJ-S | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Security Builder GSE-C provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec, SSL and DRM modules." 01/15/08: Update implementation version; |
640 | SafeNet Inc. 350 Convention Way Redwood City, CA 94063 USA -Eric Murray
|
Version 1.0 |
VIA C3 w/ CentOS v4.3; Intel Dual Core Xeon w/ Intel Dual Core Xeon | 7/2/2007 |
SHA-1     
(BYTE-only) "The SafeNet Inc. DataSecure appliance is a dedicated hardware product that is designed specifically for security and cryptographic processing." 10/27/08: Update vendor and implementation information; |
639 | Jetstream Media Technologies Corporation 800 W. 5th Ave., Suite 201E Naperville, IL 60563 USA -Philip Chao
|
Version 4.0 (Firmware) |
Xilinx XC2V2000 | 7/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Jetstream JetHash secure hashing engine is a reusable silicon IP core for use in ASIC and FPGA, designed for medium speed with small area, and capable of supporting all SHA algorithms." |
638 | Xirrus, Inc. 370 N. Westlake Blvd., Suite 200 Westlake Village, CA 91362 USA -Patrick Parker
|
Version 3.2 |
MPC8540 w/ Linux | 7/2/2007 |
SHA-1     
(BYTE-only) "The Xirrus Wireless LAN Array represents the next generation in enterprise wireless LAN architecture - combining the functionality of a WLAN switch and Integrated Access Points (IAPs) in a single device. The WLAN Array delivers Gigabit-class Wi-Fi bandwidth to an extended coverage area simplifying the wireless LAN setup, deployment and management." |
637 | HP 110 Spit Brook Road Nashua, NH 03062 USA -Linda Knippers
|
Version openssl-0.9.8b-8.3.el5 |
Intel Pentium IV based CPU w/ Red Hat Enterprise Linux 5 | 6/15/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, SHA are used in Red Hat Enterprise Linux Server/Client Version 5 on HP Integrity Superdome / ProLiant product line" |
636 | HP 110 Spit Brook Road Nashua, NH 03062 USA -Linda Knippers
|
Version openssl-0.9.8b-8.3.el5 |
AMD Opteron based CPU w/ Red Hat Enterprise Linux 5 | 6/15/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, SHA are used in Red Hat Enterprise Linux Server/Client Version 5 on HP Integrity Superdome / ProLiant product line" |
635 | HP 110 Spit Brook Road Nashua, NH 03062 USA -Linda Knippers
|
Version openssl-0.9.8b-8.3.el5 |
Intel Itanium2 based CPU w/ Red Hat Enterprise Linux 5 | 6/15/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, SHA are used in Red Hat Enterprise Linux AS Version 5 on HP Integrity Superdome / ProLiant product line" |
634 | HP 110 Spit Brook Road Nashua, NH 03062 USA -Linda Knippers
|
Version openssl-0.9.8b-8.3.el5 |
Intel Xeon EM64T based CPU w/ Red Hat Enterprise Linux 5 | 6/15/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, SHA are used in Red Hat Enterprise Linux Server/Client Version 5 on HP Integrity/ProLiant product line" |
633 | Athena Smartcard Inc. 20380 Town Center Lane, Suite 240 Cupertino, CA 95014 USA -Ian Simmons
|
Version 0106.6340.0101 (Firmware) |
Atmel AT90SC25672RCT-USB | 6/15/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Athena Smartcard is a global company offering a wide range of ID products for Government and Enterprise customers: FIPS 140-2 and 201 certified smart card operating systems in a variety of form-factors on various chips, readers, cross-platform cryptographic middleware and innovative biometric and card management solutions." |
632 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 1.0 |
Intel Pentium 4 w/ Windows 2003 SP1; Intel Pentium 4 w/ Windows 2000 Server SP4 | 6/15/2007 |
SHA-1     
(BYTE-only) "Cisco Secure ACS FIPS Module is a software library that supports WPA2 security and is contained within a defined cryptographic boundary. It provides FIPS 140-2 validated support for EAP-TLS, EAP-FAST, PEAP and AES key wrap for 802.11i PMK transfer." |
631 | Security First Corporation 22362 Gilberto #130 Rancho Santa Margarita, CA 92688 USA -Rick Orsini
|
Version 1.0 |
Intel x86-compatible w/ Windows 2003 Server; Intel x86-compatible w/ Red Hat Enterprise Linux 4; Intel x86-compatible w/ Suse Enterprise Linux 10; Intel x86-compatible w/ Windows XP | 6/15/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "A software cryptographic module supporting encryption, authentication, and data redundancy techniques." 1/16/08: Update OE because of spelling error; |
630 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
|
Part # CN505-183LQ128 |
N/A | 5/31/2007 |
SHA-1     
(BYTE-only) "The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes." |
629 | Neopost Technologies, S.A. 113 Rue Jean Marin Naudin BAGNEUX, 92220 France -Nathalie Tortellier
|
Version 4135354K Issue A (Firmware) |
Toshiba TMPR3912AU | 5/31/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "New Generation Neopost Postal Secure Device." |
628 | Teletec Corporation 5617-107 Departure Drive Raleigh, NC 27616 US -Diane Hunter
-Harry Taji
|
Version 1.00 (Firmware) |
TMS320VC5470, ARM7TDMI Subsystem | 5/31/2007 |
SHA-1     
(BYTE-only) "A cryptographic algorithm library developed for TL905 module that includes implementations of: AES block cipher that works in ECB and OFB modes, ANSI X9.31 RNG based on AES and HMAC-SHA-1 hashed MAC function." |
627 | Aladdin Knowledge Systems, Ltd. 35 Efal St. Kiryat Arye, Petach Tikva 49511 Israel -Yaniv Shor
|
Version CardOS 4.2B (Firmware) |
N/A | 5/23/2007 |
SHA-1     
(BYTE-only) The algorithm implementation of SHA-1 does not accept zero or null length messages. "eToken PRO, eToken NG-OTP and eToken NG-FLASH are fully portable USB devices that offer a breadth of security solutions, including secure network logon, secure VPN access, secure email, and strong PKI support. One Time Password generation and mass storage are provided with the hybrid eToken NG-OTP and eToken NG-FLASH series." |
626 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.1 Part # Intel P4 Processor w/ Windows 2000 Server Service Pack 4 |
N/A | 5/23/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution." |
625 | Mocana Corporation 350 Sansome Street Suite 210 San Francisco, CA 94104 USA -James Blaisdell
|
Version Rev. 3468 |
Cell w/ Linux 2.6.16 | 5/31/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Mocana Device Security Framework includes: Certificate Management, EAP supplicant and pass-thru/standalone authenticator, RADIUS, SSL/TLS Server and Client, SSH Server and Client and IPSec/IKE/IKEv2/MOBIKE/VPN. Free evaluation available at www.mocana.com/evaluate.html" |
624 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8b-8.3.el5 |
AMD Opteron 64bit w/ Red Hat Enterprise Linux Version 5 | 5/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA are used on AMD Opteron based CPU in IBM System x" |
623 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8b-8.3.el5 |
IBM POWER5 w/ Red Hat Enterprise Linux Version 5 | 5/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA are used on IBM POWER 5 based System p" |
622 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.98b-8.3.el5 |
IBM z/Archtecture w/ Red Hat Enterprise Linux Version 5 | 5/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA are used on System z" |
621 | IBM 11400 Burnet Rd Austin, TX 78758 USA -George Wilson
|
Version openssl-0.9.8b-8.3.el5 |
Intel Xeon EM64T w/ Red Hat Enterprise Linux Version 5 | 5/23/2007 |
SHA-1     
(BYTE-only) "TDES, AES, RSA, and SHA are used in Intel Xeon EM64T" |
620 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 0.9.7l |
Motorola MPC8540 PowerQUICC III w/ Linux Montavista Hardhat 2.4.20 | 5/15/2007 |
SHA-1     
(BYTE-only) "The Cisco 4400 Series Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture." |
619 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 2.1 |
Motorola MPC8540 PowerQUICC III w/ Linux Montavista Hardhat 2.4.20 | 5/15/2007 |
SHA-1     
(BYTE-only) "The Cisco 4400 Series Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture." |
618 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Dave Friant
-Kelvin Yu
|
Version 1.0 |
Intel Pentium 4 w/ Windows Vista; Intel Pentium D w/ Windows Vista | 5/15/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Windows Cryptographic Primitives Library is a general purpose, software-based, cryptographic module which can be dynamically linked into applications by developers to permit the use of FIPS 140-2 Level 1 compliant cryptography." |
617 | Secure Computing Corporation 2340 Energy Park Drive St. Paul, MN 55108 USA -Mark Hanson
-Steve Marquess
|
Version 9.7.1 |
x86 Processor w/ SecureOS® V6.1; x86 Processor w/ SecureOS® V7.0 | 5/15/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Library for SecureOS® is a library for software providing cryptographic services for applications on versions of Sidewinder G2® Security Applicance™ and Sidewinder G2 Enterprise Manager™." 06/04/07: Add new OES; |
616 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.6.1 (Firmware) |
Strong ARM II (80219) | 5/15/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna Cryptographic Firmware Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware and associated co-processor." |
615 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
-Joe Gandiosi
|
Version 3.1 (Firmware) |
Intel Celeron; Intel Pentium III | 5/15/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Suite of Algorthms (AES, 3DES, SHA, HMAC and RNG) will execute on a gateway to provides security to the corporate network by protecting communications between wireless devices and the rest of the network." |
614 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 2.4 |
PowerPC w/ Yellowdog Linux 2.6; ARMv7 w/ Maemo Linux 5 | 5/7/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-C provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec, SSL and DRM modules." 10/20/08: Add new tested OES; |
613 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tolga Acar
-Dave Friant
|
Version 5.2.3790.3959 |
Intel Itanium w/ Windows Server 2003 SP2; Intel Pentium D w/ Windows Server 2003 SP2; AMD Athlon XP 1800+ w/ Windows Server 2003 SP2 | 5/7/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Enhanced Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based cryptographic module. RSAENH encapsulates several different cryptographic algorithms in a cryptographic module accessible via the Microsoft CryptoAPI." |
612 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 4.0 B (Firmware) |
ARM 920T; ARM926EJ-S | 5/7/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "Security Builder GSE-C provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec, SSL and DRM modules." 01/15/08: Update implementation version; |
611 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tolga Acar
-Dave Friant
|
Version 5.2.3790.3959 |
Intel Itanium w/ Windows Server 2003 SP2; Intel Pentium D w/ Windows Server 2003 SP2; AMD Athlon XP 1800+ w/ Windows Server 2003 SP2 | 5/7/2007 |
SHA-1     
(BYTE-only) "The Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH), designed for FIPS 140-2 compliance, is a software-based, cryptographic module. DSSENH encapsulates several different cryptographic algorithms in a cryptographic module accessible via the Microsoft CryptoAPI." |
610 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tolga Acar
-Dave Friant
|
Version 5.2.3790.3959 |
Intel Itanium w/ Windows Server 2003 SP2; Intel Pentium D w/ Windows Server 2003 SP2; AMD Athlon XP 1800+ w/ Windows Server 2003 SP2 | 5/7/2007 |
SHA-1     
(BYTE-only) "Microsoft Corporation's Windows Server 2003 Kernel Mode Module (FIPS.SYS) is a general-purpose, software-based cryptographic module residing at the Kernel Mode level of the Windows OS. It runs as a kernel mode export driver and encapsulates several different cryptographic algorithms in a module accessible by other kernel mode drivers." |
609 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill Mcintosh
|
Version 1.0 (Firmware) |
AMD Alchemy Au1000 | 4/30/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Secure Client Bridge provides authenticated, encrypted communication between a Fortress-secured network and any device that cannot, by itself, run the Fortress Secure Client Software." |
608 | Tumbleweed Communications Corp. 700 Saginaw Drive Redwood City, CA 94063 USA -Stefan Kotes
|
Version 2.0 |
Intel Pentium III w/ Windows Server 2003 | 4/30/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Tumbleweed Security Kernel is a software module implemented as two dynamic libraries that provide all security functionalities for several products of Tumbleweed Communications Corp., including Validation Authority, SecureTransport, and MailGate." |
607 | Beijing Time Antaeus Media Tech.Co.Ltd F2 Space Montage,No.9,North Road,Wenhuiyuan, Haidian District Beijing, 100088 P.R. China -Gang Qing
-Lina Ma
|
Version 1.1 |
one INTEL Woodcrest 1.6G hz on main board w/ RedHat Enterprise Linux 4 (Nahant Update 3) | 4/30/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The CDCS2000 SM Cryptography Implementation is part of SM in CDCS2000. The Cryptography Implementation provides an Application Programming Interface (API) to support all secruity-relevent services of SM in CDCS2000. The implementation is based on the OpenSSL FIPS module(version 1.1.1)." |
606 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
|
Version 7.2.2.18 |
Intel Celeron w/ Adaptive Security Appliance OS 7.2.2.18; Intel Pentium IV w/ Adaptive Security Appliance OS 7.2.2.18; AMD Geode GX3 w/ Adaptive Security Appliance OS 7.2.2.18; Pentium II w/ Adaptive Security Appliance OS 7.2.2.18; Pentium III w/ Adaptive Security Appliance OS 7.2.2.18 | 4/23/2007 |
SHA-1     
(BYTE-only) "The market-leading Cisco PIX and ASA security appliances deliver robust user and application policy enforcement and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco PIX and ASA security appliances provide comprehensive security, performance, and reliability for network environments of all sizes." 06/28/07: Update version number, existing OES' and add new OES'; |
605 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill Mcintosh
|
Version 1.0 ( Firmware) |
AMD Alchemy Au1000 | 4/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Fortress Secure Client Bridge provides authenticated, encrypted communication between a Fortress-secured network and any device that cannot, by itself, run the Fortress Secure Client Software." |
604 | VMware, Inc. 3145 Porter Drive Palo Alto, CA 94304 USA -Eric Masyk
|
Version 1.0 |
Intel Pentium IV w/ Windows XP SP2 Professional; Intel Pentium IV w/ Windows Vista Ultimate | 4/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The ACE Encryption Engine allows virtual machines to be encapsulated into files which can be saved, copied, and provisioned. VMware Software Cryptographic Implementation is the kernel implementation that enables the VMware ACE application to perform its cryptographic functions such as hashing, encryption, digital signing, etc." |
603 | VMware, Inc. 3145 Porter Drive Palo Alto, CA 94304 USA -Eric Masyk
|
Version 1.0 |
Intel Pentium IV w/ Windows XP SP2 Professional; Intel Pentium IV w/ Windows Vista Ultimate | 4/23/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The ACE Encryption Engine allows virtual machines to be encapsulated into files which can be saved, copied, and provisioned. VMware Software Cryptographic Implementation is the kernel implementation that enables the VMware ACE application to perform its cryptographic functions such as hashing, encryption, digital signing, etc." |
602 | Neoscale Systems 1655 McCarthy Blvd. Milpitas, CA 95035 USA -Rose Quijano-Nguyen
-Landon Curt Noll
|
Version 1.1 (Firmware) |
Intel Xeon | 4/23/2007 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "CryptoStor KeyVault uses C++ classes built on OpenSSL for routine cryptographic operations. Supported algorithms are AES (128-bit,192-bit, and 256-bit), Triple DES (118-bit and 168-bit), RSA,and SHA512. This enables the CryptoStor KeyVault product to use an open source solution for crytography that is FIPS 140-2 certified." |
601 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # SSG520M, SSG550M |
Intel Celeron D, Intel Pentium 4 | 4/23/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks Secure Services Gateway 500 Series (SSG) represents a new class of purpose-built security appliance that delivers a perfect mix of performance, security and LAN/WAN connectivity for regional and branch office deployments." |
600 | iDirect Technologies, Inc. 13865 Sunrise Valley Drive Suite 100 Herndon, VA 20171 USA -Michael Cohen
|
Version 7.1 |
Intel 425 w/ Linux 2.4.24 | 4/23/2007 |
SHA-1     
(BYTE-only) "iDirect Technologies' VSAT solutions enable enterprise IT application delivery when performance, bandwidth, and efficient capital costs are required." |
599 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # 5.4.0r4 |
Intel IXP465 | 3/30/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks Secure Services Gateway 5 (SSG 5) and Secure Services Gateway 20 (SSG 20) are purpose-built security appliances that deliver a perfect blend of performance, security and LAN\WAN connectivity for small branch office and small business deployments." |
598 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # NS5GT |
Intel IXP465 | 3/30/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks NetScreen NS5GT is an Internet security device that integrates firewall, virtual private networking (VPN), and traffic shaping functions." |
597 | Tumbleweed Communications Corp. 700 Saginaw Drive Redwood City, CA 94063 USA -Stefan Kotes
|
Version 2.0 |
IBM p5 (PowerPC) w/ IBM AIX 5.2.0.0; Intel dual core Xeon (core 2) 64-bit w/ SuSE Linux 9; Sun UltraSparc 2 w/ SunOS 5.10; Intel Pentium 4 w/ Windows XP SP 2 | 4/23/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Tumbleweed Security Kernel is a software module implemented as two dynamic libraries that provide all security functionalities for several products of Tumbleweed Communications Corp., including Validation Authority, SecureTransport, and MailGate." |
596 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.1 (Firmware) |
Atmel "Secure uController" AT90SC144144C-AL | 3/28/2007 |
SHA-256 
(BYTE-only) "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for the Decru LKM (Lifetime Key Management) appliance." 10/22/07: Update vendor POC information; |
595 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.1 (Firmware) |
Atmel "Secure uController" AT90SC144144C-AL | 3/28/2007 |
SHA-1     
(BYTE-only) "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for the Decru LKM (Lifetime Key Management) appliance." 10/22/07: Update vendor POC information; |
594 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Taiwan, ROC -Yeou-Fuh Kuan
-Char-Shin Miou
|
Version 4.0 (Firmware) |
AE-5 | 3/28/2007 |
SHA-1     
(BYTE-only) "The HICOS PKI Smart Card Library is a set of cryptographic functions that perform ncryption/Decryption, Key Generation, and Signature operations for the HICOS PKI Smart Card" |
593 | Doremi Labs 1020 Chestnut Street Burbank, CA 91506 USA -Jean-Philippe Viollet
-Camille Rizko
|
Version 1.1 (Firmware) |
Freescale MMC2114 | 3/28/2007 |
SHA-1     
(BYTE-only) "An implementation of the SHA1 algorithm for use in Doremi DCP-2000 Digital Cinema Server media block." 06/26/13: Updated vendor information; |
592 | Dolby Laboratories, Inc. 100 Potrero Ave. San Francisco, CA 94103 USA -Matthew Robinson
|
Version 0.9.71/FIPS-1.0 |
MicroBlaze w/ Custom microkernel | 3/28/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "OpenSSL crypto subsystem for MicroBlaze." |
591 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # NS204, NS208 |
PMC-Sierra, RM5261A-350H | 3/30/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks NetScreen-200 series includes two enterprise network products: the NetScreen-204 appliance with four 10/100 interfaces, and the NetScreen-208 appliance with eight 10/100 interfaces." |
590 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # NS500 |
QED-MIPS CPU, RM7000-300T | 3/30/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks NetScreen-500 system is a purpose-built, integrated security system that provides a flexible, high-performance solution for medium and large enterprise central sites and service providers." |
589 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Ganapathy Raman
-Katharine Holdsworth
|
Version 6.00.1937 |
MIPS-IV (NEC VR-5477) w/ Windows CE 6.0; Intel Pentium 4 w/ Windows CE 6.0; ARM v4i (Intel PXA 27x) w/ Windows CE 6.0; SH4 (Renesas SH7750) w/ Windows CE 6.0; Intel Pentium 4 w/ Windows CE 6.0 R2; ARM v4i (Intel PXA 27x) w/ Windows CE 6.0 R2; MIPS-IV (NEC VR-5477) w/ Windows CE 6.0 R2; SH4 (Renesas SH7750)w/ Windows CE 6.0 R2 | 3/28/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Microsoft Windows CE and Windows Mobile Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE and Windows Mobile. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography." 10/30/07: Add new OEs; |
588 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) Part # ISG1000, ISG2000 |
Dual PowerPC 7447 | 3/30/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks NetScreen ISG-1000 and ISG-2000 are Internet security devices that integrate firewall, virtual private networking (VPN), and traffic shaping functions." |
587 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Tim Stahlke
|
Version 5.4.0r4 (Firmware) |
NS5200, NS5400 | 3/22/2007 |
SHA-1     
(BYTE-only) "The Juniper Networks NetScreen-5000 series is a line of purpose-built, high-performance firewall/VPN security systems designed to deliver a new level of high-performance capabilities for large enterprise, carrier, and data center networks." |
586 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Moshe Harel
|
Version 4.1 (Firmware) |
Pentium IV | 3/20/2007 |
SHA-1     
(BYTE-only) "CoSign is a non-forgeable, simple-to-use electronic signature solution. It delivers an innovative way to electronically sign documents." |
585 | Athena Smartcard Solutions 6F Marutaya Building 6-9 Yokoyama-Cho Tokyo, Hachioji 192-00081 Japan -Naomi Matsumoto
|
Version OS755 Version 2.4.7 (Firmware) Part # AE46C1, Version 0.1 |
AE46C1 | 3/20/2007 |
SHA-1     
(BYTE-only) "The Hitachi One-Passport PKI Card Application on Athena Smartcard Solutions OS755 for Renesas XMobile Card Module is a multimedia card with flash memory and SD card interface. It stores digital certificates used by external applications on PC and PDA, and offers RSA key generation with strong prime numbers (ANSI X9.31), RSA PKCS #1 and TDES CBC." |
584 | Utimaco Safeware AG Hohemarkstrasse 22 Oberursel, 61440 Germany -Dr. Christian Tobias
-Utimaco US Corporate Headquarters
|
Version 5.00 |
Intel Pentium 4 2.66 GHz Processor w/ Free BSD 5.4; Intel Pentium 4 2.66 GHz Processor w/ Windows Server 2003 Enterpise edition SP1; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2 (Kernel mode) | 3/20/2007 |
SHA-256 
(BYTE-only) "The SafeGuard Cryptographic Engine (SGCE) HMAC Library is a FIPS 198 compliant software implementation of HMAC-SHA-256 that is used in all Utimaco Safeware's products listed in the security policy document." |
583 | Utimaco Safeware AG Hohemarkstrasse 22 Oberursel, 61440 Germany -Dr. Christian Tobias
-Utimaco US Corporate Headquarters
|
Version 5.00 |
Intel Pentium 4 2.66 GHz Processor w/ Free BSD 5.4; Intel Pentium 4 2.66 GHz Processor w/ Windows Server 2003 Enterpise edition SP1; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2 (Kernel mode) | 3/20/2007 |
SHA-1     
(BYTE-only) "The SafeGuard Cryptographic Engine (SGCE) RNG Library is a FIPS 186-2 compliant deterministic RNG that is used in all Utimaco Safeware's products listed in the security policy document." |
582 | Utimaco Safeware AG Hohemarkstrasse 22 Oberursel, 61440 Germany -Dr. Christian Tobias
-Utimaco US Corporate Headquarters
|
Version 5.00 |
Intel Pentium 4 2.66 GHz Processor w/ Free BSD 5.4; Intel Pentium 4 2.66 GHz Processor w/ Windows Server 2003 Enterpise edition SP1; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2; Intel Pentium 4 2.66 GHz Processor w/ Windows XP Pro SP2 (Kernel mode) | 3/20/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The SafeGuard Cryptographic Engine (SGCE) SHA Library is a FIPS 180-2 compliant software implementation of the SHA algorithm that is used in all Utimaco Safeware's products listed in the security policy document." |
581 | SafeNet, Inc. 20 Colonnade Road, Suite 200 Ottawa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 5.1.4 (Firmware) |
Strong Arm II (80219) | 3/20/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna IS Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware and associated co-processor." |
580 | Elliptic Semiconductor, Inc. 308 Legget Drive, Suite 202 Kanata, Ontario K2K 1Y6 Canada -Al Hawtin
-Russ Baker
|
Version 1.1 |
AMD 64 w/ Gentoo 2.6.18-gentoo-r6; AMD Sempron w/ Enterprise RedHat Linux v3 2.4.21; Intel P4 64 bit w/ Fedora Core 5 2.6.18; Intel P4 w/ Fedora Core 4 2.6.11; Intel P4 w/ Fedora Core 5 2.6.19; Intel P4 w/ Enterprise RedHat Linux v3 2.4.21 | 3/14/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Ellipsys is a C software package with cryptographic capabilities in a configurable format. It supports public key encryption, symmetric ciphers, hash functions, message authentication through a simple API. Ellipsys is efficient and portable for embedded applications implemented in software or leveraging hardware offload engines." |
579 | SafeNet Canada, Inc. 20 Colonnade Road, Suite 200 Ottowa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.6.1 (Firmware) |
StrongARM-II, 80200, 600 MHz, RoHS; StrongARM-II, 80200, 600 MHz | 3/14/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna(r) PCM/CA4 offer hardware key management and cryptographic operations to protect sensitive keys. Keys may be backed up and can be protected in software using a FIPS approved algorithm or replicated on one or more CA4 tokens." |
578 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Klorida Miraj
-Katharine Holdsworth
|
Version 5.04.17228 |
ARMv4i w/ Windows Mobile 6; ARMv4i w/ Windows Mobile 6.1; ARMv4i w/ Windows Mobile 6.5 | 3/14/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Microsoft Windows CE and Windows Mobile Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE and Windows Mobile. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography." 04/02/08: Add New OE and update the vendor information; |
577 | Neoscale Systems 1655 McCarthy Blvd. Milpitas, CA 95035 USA -Rose Quijano-Nguyen
-Landon Curt Noll
|
Version 2.5 (Firmware) |
Intel Xeon | 2/28/2007 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "The CryptoStor Cryptographic Library v2.5 provides encryption services performed through software for NeoScale's CryptoStor family of products" |
576 | XYPRO Technology Corporation 3325 Cochran Street, Suite #200 Simi Valley, CA 93063 USA -Sheila Johnson
-Scott Uroff
|
Version 2.0.0 |
Intel Pentium 4 w/ Windows XP w/ SP 2; Sun UltraSparc w/ Solaris 10; HP PA-RISC w/ HP-UX 11.11; MIPS R10000 w/ HP Nonstop Server G06; Intel Itanium2 w/ HP Nonstop Server H06; CLX 800 series w/ HP Nonstop Guardian D39; Intel Xeon w/ IBM zOS 1.7 ADCD on FLEX-EX s390 on SCO Unix 7.1.4 | 2/27/2007 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The XYGATE /ESDK is a general purpose library that provides symmetric key encryption, hashing algorithms, public key encryption, digital signature algorithms, secure session protocols, and secure e-mail protocols." |
575 | Software House 70 Westview Street Lexington, MA 02421 USA -Mark Goldstein
-Rick Focke
|
Version 4.1.1.12045 (Firmware) |
iSTAR eX controller | 2/27/2007 |
SHA-1     
(BYTE-only) "The iSTAR eX is a full-features access control panel, providing physical access control for up to four (4) doors. It supports all major identification echnologies including Wiegand, proximity, magnetic stripe cards, keypads, smart cards and biometrics. The iSTAR eX is an integral part of teh powerful Software House C*CURE 800/8000(r) Security Man" 03/20/07: Update firmware version number; |
574 | TANDBERG Telecom AS Philip Pedersens Vei 20 1366 Lysaker Oslo, Norway -Stig Ame Olsen
|
Version F6.0 (Firmware) |
On target testing with Nucleus Plus RTOS running under MPC8270 PowerPC processor | 2/27/2007 |
SHA-1     
(BYTE-only) "The TANDBERG MXP Codec Cryptography Implementation is part of the firmware for the TANDBERG MXP Codec. The Cryptography Implementation provides an Application Programming Interface (API) to support all security-relevent services of the TANDBERG MXP Codec." 03/30/07: Update the OE and description; |
573 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 |
Intel Pentium w/ Windows 2000; Intel Pentium w/ Windows XP | 2/22/2007 |
SHA-256 
(BYTE-only) "SHA-256 and HMAC-SHA256 implementation for the Fortress Client Algorithm suite." |
572 | KoolSpan Inc. PO Box 2067 North Bethesda, MD 20852 USA -Paul Benware
|
Version 1.0 |
Intel Pentium processor w/ Windows 2000; Intel Pentium processor w/ Windows XP | 2/22/2007 |
SHA-1     
(BYTE-only) "AES and SHS algorithm implementation for the KoolSpan Key cryptographic module." |
571 | Spectralink Corporation 5755 central avenue Boulder, CO 80301 USA -Pankag Agrawal
|
Version 110.062 (Firmware) |
ASIC | 2/22/2007 |
SHA-1     
(BYTE-only) "Embedded system board for encrypting/decrypting data in a wireless VOIP telephone environment." |
570 | SafeNet Canada, Inc. 20 Colonnade Road, Suite 200 Ottowa, ON K2E 7M6 Canada -Terry Fletcher
-Laurie Smith
|
Version 4.5.3 (Firmware) |
StrongARM-II 80200 600MHz ROHS | 2/9/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Luna(r) PCM/CA4 offer hardware key management and cryptographic operations to protect sensitive keys. Keys may be backed up and can be protected in software using a FIPS approved algorithm or replicated on one or more CA4 tokens." |
569 | Wei Dai 13440 SE 24th Street Bellevue, WA 98005 USA -Wei Dai
|
Version 5.3.0 |
Athlon X2 4200+ w/ Windows XP SP2; Athlon X2 4200+ w/ Windows Server 2003 x 64 SP1 | 2/9/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto++ Library is a free, open source C++ class library providing public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms. Both 32-bit and 64-bit variants of the dynamic link library (DLL) are FIPS 140-2 Level 1 validated." |
568 | IBM Corp. 11505 Burnet Rd. Austin, TX 78758 USA -Jacqueline Wilson
-Martin Clausen
|
Version 3.23 |
POWER3-II w/ AIX 5200-07(32-bit kernel); POWER3-II w/ AIX 5200-07(64-bit kernel); POWER3-II w/ AIX 5300-03(32-bit kernel); POWER3-II w/ AIX 5300-03(64-bit kernel) | 2/2/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM CryptoLite for C is a C software package providing advanced cryptographic services in a configurable footprint. CryptoLite supports public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms through a simple programming interface." |
567 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version NGX (R60) w hotfix HFA-03 (Firmware) |
Celeron M | 2/2/2007 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 module running on Nokia's IPSO security hardened operating system" |
566 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 2.3 |
ARM Processor w/ Palm OS 5 | 1/30/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-C provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec, SSL and DRM modules." |
565 | Elliptic Semiconductor, Inc. 308 Legget Drive, Suite 202 Kanata, Ontario K2K 1Y6 Canada -Patrick Offers
-Neil Hamilton
|
Part # CLP-26 |
N/A | 1/24/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Elliptic cryptographic algorithms implemented in Verilog RTL offer customers a wide range of configuration options for encryption, decryption and message authentication requirement. The HMAC/SHA core is build time configurable to optimize throughput versus gate count to meet the requirements for the target application." |
564 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version v 4.1 (Firmware) |
Celeron M | 1/24/2007 |
SHA-1     
(BYTE-only) "Nokia security hardened operating system" |
563 | Hummingbird Ltd. 1 Sparks Avenue Toronto, Ontario M2H 2W1 Canada -Xavier Chaillot
-Glen Matthews
|
Version 1.0 |
Intel Pentium 4 w/ Windows XP Pro SP2 | 1/24/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Module supports Connectivity Software such as FTP for Windows, HostExplorer, Exceed, and Connectivity Secure Shell. The cryptographic capabilities of the library are used to implement encryption and decryption services, as well as protocols such as SSL and SSH. The implementation is based on the OpenSSL code base." |
562 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version 3.09 (Firmware) Part # HW P/N 1L84004, Version A |
Gatekeeper 3 ASIC | 1/12/2007 |
SHA-1     
(BYTE-only) "The PB Cygnus X-2 PSD is in compliance with FIPS 140-2 and IPMAR security protection profile and supports the USPS IBIP and international indicia standards. The PSD employs strong encryption, decryption, and digital signature techniques for the protection of customer funds in PB Postage Metering products." |
561 | Comtech Mobile Datacom Corporation 20430 Century Boulevard Germantown, MD 20874 USA -Bruce Berlage
|
Version 1.0 (Firmware) |
Atmel AT91 Microcontroller | 1/12/2007 |
SHA-1     
(BYTE-only) "The MTM-203 Cryptographic Module, designed for FIPS 140-2 compliance, offers secure, near real-time, over-the-air communications. The MTM 203 implements the following FIPS Approved Functions Three-key Triple DES" |
560 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 2.1 |
IBM Power3 w/ AIX 5L v5.2 (32-bit); IBM Power3 w/ AIX 5L v5.2 (64-bit); IBM Power5 w/ AIX 5L v5.3 (32-bit); IBM Power5 w/ AIX 5L v5.3 (64-bit); Intel Pentium 4 w/ Red Hat Enterprise Linux AS4.0; Intel Pentium D w/ Red Hat Enterprise Linux AS4.0; Intel Itanium2 w/ HP-UX 11.23 (64-bit); Intel Itanium2 w/ HP-UX 11.23 (32-bit); PA8600-RISC 2.0 w/ HP-UX 11.11 (32-bit); PA8600-RISC 2.0W w/ HP-UX 11.23 (64-bit); SPARC v8 w/ Solaris 10 (32-bit); SPARC V8+ w/ Solaris 10 (32-bit); SPARC v9 w/ Solaris 10 (64-bit); AMD Opteron w/ Solaris10; Intel Pentium 4 w/ SuSE Linux Enterprise Server 9.0; AMD Opteron w/ SuSE Linux Enterprise Server 9.0; Motorola MPC 7455 w/ VxWorks 5.4 PowerPC 604; Motorola MPC 8260 w/ VxWorks 5.5 PowerPC 603; Motorola MPC7455 w/ VxWorks 5.5 PowerPC 604; Motorola MPC 7457 w/ VxWorks General Purpose Platform 6.0 PowerPC 604; Intel Pentium 4 w/ Windows 2003 Server, SP1 (Compiled with MS VC 6.0); Intel Pentium 4 w/ Windows 2003 Server, SP1 (Compiled with MS VC 8.0); Itanium2 w/ Windows 2003 Server, SP1; AMD Opteron w/ Windows 2003 Server, SP1; Samsung SC32442 w/ Windows Mobile 5.0; Intel PXA272 w/ Windows Mobile 5.0 PocketPC Phone Edition; TI OMAP 730 w/ Windows Mobile 2003 SE for SmartPhone; Intel PXA255 w/ Windows Mobile 2003 | 1/12/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements." |
559 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 3.6 |
32-bit x86 Intel Pentium 4 w/ Windows XP SP2 with Sun JDK 1.5; 64-bit x86_64 Intel Pentium D w/ Windows XP SP2 with Sun JDK 1.5; 32-bit PowerPC w/ AIX 5L v5.3 with IBM JDK 1.5; 64-bit SPARC v9 w/ Solaris 10 with Sun JDK 1.5; 32-bit Itanium2 w/ HP-UX 11.23 with HP JDK 1.5; 64-bit Itanium2 w/ HP-UX 11.23 with HP JDK 1.5; 32-bit x86 Intel Pentium 4 w/ Red Hat Enterprise Linux AS 4.0 with Sun JDK 1.5; 64-bit x86_64 Intel Pentium D w/ Red Hat Enterprise Linux AS 4.0 with Sun JDK 1.5; 32-bit x86 Intel Pentium 4 w/ SUSE Linux Enterprise Server 9.0 with Sun JDK 1.5; 64-bit x86_64 AMD Opteron w/ SUSE Linux Enterprise Server 9.0 with Sun JDK 1.5; 64-bit PowerPC w/ AIX 5L v5.3 with IBM JDK 1.5; 32-bit SPARC v8+ w/ Solaris 10 with Sun JDK 1.5 | 1/12/2007 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." 08/03/07: Update OES; |
558 | Arcot Systems, Inc. 455 West Maude Ave. Sunnyvale, CA 94085 USA -Rob Jerdonek
|
Version 2.0 |
Intel x86 w/ Windows 2003 Service Pack 1; Intel x86 w/ Windows XP Service Pack 2 | 12/28/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Arcot Core Security Module provides FIPS-certified cryptographic functionality to Arcot's authentication, encryption/decryption and digital signing products -- ArcotID "software smart card", Arcot WebFort Authentication Server, Arcot SignFort, and Arcot TransFort for 3-D Secure compliance." |
557 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.4(11)T1 (Firmware) |
Broadcom BCM Sibyte 1250 | 12/28/2006 |
SHA-1     
(BYTE-only) "Cisco 7206VXR routers with an NPE-G1 support up to 6 high-speed port adapters and also higher-speed port adapter interfaces including Gigabit Ethernet and OC-12 ATM. The compact Cisco 7301 router processes million packets/sec and has 3 built-in Gigabit Ethernet interfaces and a single slot for any Cisco 7000 Series port adapter." |
556 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.4(11)T1 (Firmware) |
Freescale MPC 7448 | 12/28/2006 |
SHA-1     
(BYTE-only) "A Cisco 7206 VXR router equipped with an NPE-G2 provides integrated I/O functionality and can support up to six high-speed port adapters and can also support higher-speed port adapter interfaces including Gigabit Ethernet and OC-12 ATM." |
555 | SanDisk Corporation 7 Atir Yeda St. Kfar Saba, 44425 Israel -Donald Rich
|
Version 0x0305 (Firmware) |
ARM7 | 12/28/2006 |
SHA-1     
(BYTE-only) Does not support the hashing of NULL messages "SHA1 algorithm implementation compliant with FIPS 180-2 standard." |
554 | ARX (Algorithmic Research) 10 Nevatim St Petah-Tikva, Israel 49561 Israel -Moshe Harel
|
Version 4.1 (Firmware) |
Pentium IV | 12/28/2006 |
SHA-1     
(BYTE-only) "CoSign is a non-forgeable, simple-to-use electronic signature solution. It delivers an innovative way to electronically sign documents." 03/20/07: Update impl. name and type - from HW to FW. |
553 | RSA Security Inc. 174 & 176 Middlesex Turnpike Bedford, MA 01730 USA -Kathy Kriese
|
Version 3.6 |
64-bit PowerPC w/ AIX 5L v5.3 with IBM JDK 1.5; 64-bit x86_64 AMD Opteron w/ SUSE Linux Enterprise Server 9.0 with Sun JDK 1.5; 32-bit x86 Intel Pentium 4 w/ SUSE Linux Enterprise Server 9.0 with Sun JDK 1.5; 64-bit x86_64 Intel Pentium D w/ Red Hat Enterprise Linux AS 4.0 with Sun JDK 1.5; 32-bit x86 Intel Pentium 4 w/ Red Hat Enterprise Linux AS 4.0 with Sun JDK 1.5; 64-bit Itanium2 w/ HP-UX 11.23 with HP JDK 1.5; 32-bit Itanium2 w/ HP-UX 11.23 with HP JDK 1.5; 64-bit x86_64 Intel Pentium D w/ Windows XP SP2 with Sun JDK 1.5; 32-bit x86 Intel Pentium 4 w/ Windows XP SP2 with Sun JDK 1.5; 32-bit SPARC v8+ w/ Solaris 10 with Sun JDK 1.5; 64-bit SPARC v9 w/ Solaris 10 with Sun JDK 1.5; 32-bit PowerPC w/ AIX 5L v5.3 with IBM JDK 1.5 | 12/28/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." |
552 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ed Smith
|
Version 01.01.06 (Firmware) |
IBM PowerPC 405GPr | 12/28/2006 |
SHA-1     
(BYTE-only) "The ViaSat Enhanced Bandwidth Efficient Modem (EBEM-500) series Satcom Modem provides the latest in efficient modulation and coding for point-to-point Satcom connections. The EBEM-500 series offers embedded encryption integrating the security functions into the modem to provide an integrated secure Satcom modem product." |
551 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Kim Trites
-Shoubhik Ghosh
|
Version 7.1 |
Intel® Pentium® D dual-core 3.2 GHz Processor w/ Windows Server 2003 | 12/21/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Entrust Security Kernel for Security Manager is the cryptographic module used by internal C++ components, providing secure functions to Authority and toolkits. Entrust customers can access these functions via the application programming interface available for the toolkits." 01/29/07: Update the Description. |
550 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Marjo F. Mercado
|
Version 2.6.18.1 (Firmware) |
Intel Pentium 4 | 12/21/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium's GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP's." |
549 | Xceedium, Inc. 30 Montgomery Street, Suite 1020 Jersey City, NJ 07302 USA -Marjo F. Mercado
|
Version 0.9.7l (Firmware) |
Intel Pentium 4 | 12/21/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Xceedium's GateKeeper appliance delivers a secure centralized management platform. IT operations can provide touch free support and securely manage/control vendors, outsourced developers and MSP's." |
548 | Snapshield, Ltd. 1 Research Court, Suite 450 Rockville, MD 20850 USA -Victor Elkonin
|
Version 1.1 |
Xscale w/ Windows Mobile; Pentium w/ Windows XP; OMAP w/ Windows Mobile | 12/21/2006 |
SHA-1     
(BIT) SHA-224  (BIT) SHA-256  (BIT) SHA-384  (BIT) SHA-512  (BIT) "Snapsoft is a voice and data security solution for GSM and CDMA based Smartphones. Available as a software download for Commercial Off-the-Shelf Smartphones, Snapsoft is completely unobtrusive, eliminating the need for a hardware dongle or dedicated handset. Snapsoft also provides a solution for data at rest and in motion." |
547 | Utimaco IS GmbH Germanusstrasse 4 Aachen, D-52080 Germany -Rainer Herbertz
|
Version 2.0.0.0 (Firmware) |
Texas Instruments TMS320C6414 | 12/21/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CryptoServer CS is an encapsulated, tamper-protected hardware security module which provides secure cryptographic services like encryption or decryption, hashing, signing and verifying of data, random number generation, on-board secure key generation, key storage and further key management functionality." |
546 | VIACK Corporation 16701 NE 80th St., Suite 100 Redmond, WA 98052 USA -Peter Eng
|
Version 4.2 |
Intel Pentium 4 3.00GHz w/ Windows XP SP2 | 12/21/2006 |
SHA-1     
(BYTE-only) "The VIA3 VkCrypt Cryptographic Module is a software cryptographic module that implements symmetric and public key encryption, digital signatures, and hashing. VIA3 is a secure online collaboration solution integrating real-time audio and video, instant messaging, application sharing, and access to workspaces." |
545 | Good Technology, Inc. 4250 Burton Drive Santa Clara, CA 95054 USA -Daphne Won
|
Version 4.9.1 |
ARM9 250 Mghz processor w/ Symbian 9.1 | 12/12/2006 |
SHA-1     
(BYTE-only) "Good FIPS Crypto is a software-based algorithm implementation that supports Triple-DES, AES, SHA-1 and HMAC-SHA-1." |
544 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Part # CP-4 |
N/A | 12/12/2006 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-4" |
543 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Part # CP-5 |
N/A | 12/12/2006 |
SHA-1     
(BYTE-only) "The hardware implementation of the FortiASIC Hardware Accelerated Cryptographic Library as implemented in the FortiASIC version CP-5" |
542 | Secured User, Inc 11490 Commerce Park Drive Suite 205 Reston, Va 20191 USA -Ken Hetzer
|
Version 1.1 |
Intel Pentium III w/ Windows Server 2003; Intel Pentium III w/ SUSE; Intel Pentium III w/ Red Hat; Intel Pentium III w/ Fedora; Intel Pentium III w/ HP-UX; Intel Pentium III w/ Windows Server 2003 64-bit | 12/12/2006 |
SHA-1     
(BYTE-only) "The cryptographic module is accessed by its host application, the SecuredUser. All of the cryptographic functionality of the SecuredUser product is contained in the SUSK Security Module ("susk_ssl.dll")." 05/13/08: Update implementation version; |
541 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada -Atsushi Yamada
-Randy Tsung
|
Version 2.2 |
ARM w/ LG T98VZV05 with BREW 3.1 | 12/12/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-C provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. Optimized with Elliptic Curve Cryptography, it can also be used with Certicom's PKI, IPSec, SSL and DRM modules." 03/06/07: Update the Operating System; |
540 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Version 3.0 (Firmware) |
Intel x86 | 12/12/2006 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet SSL Cryptographic Library v3.0 runs on an Intel x86 compatible processor using the FortiOS." |
539 | Fortinet, Inc. 1090 Kifer Road Sunnyvale, CA 94086-5301 USA -Alan Kaye
-Yannick Dubuc
|
Version 3.0 (Firmware) |
Intel x86 | 12/12/2006 |
SHA-1     
(BYTE-only) "The firmware implementation of the Fortinet FIPS Cryptographic Library v3.0 runs on an Intel x86 compatible processor using the FortiOS." |
538 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill Macintosh
|
Version 1.0 (Firmware) |
MIPS Processor | 12/4/2006 |
SHA-256 
(BYTE-only) "SHS implementation for the Fortress FC-X appliance." |
537 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Atsushi Yamada
|
Version 2.1 |
Intel x86 w/ WindowsXP; Intel x86 64 bit w/ WindowsXP with JRE 1.5; 64 bit SPARC w/ Solaris 9 with JRE 1.5; 32 bit SPARC w/ Solaris 9 with JRE 1.5; Intel x86 64 bit w/ Red Hat Linux AS 4.0 with JRE 1.5; Intel x86 w/ Red Hat Linux AS 3.0 with JRE 1.5; UltraSPARC III w/ Solaris 10 with JRE 1.5 | 12/4/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-J provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into Java-based apps for FIPS 140-2 and Suite B security. Optimized with Elliptic Curve Cryptography, it can also be used with Certicom's PKI and SSL modules" 09/12/07: Add new OE; |
536 | Giesecke & Devrient America, Inc. 45925 Horseshoe Drive Dulles, VA 20166 USA -Won J. Jun
-Hassan Tavassoli
|
Version V1.0 (Firmware) |
Renesas AE46C1, 16-bit CPU | 12/4/2006 |
SHA-256 
(BYTE-only) "Giesecke & Devrient (G&D) Smart Card Chip Operating System Sm@rtCafé Expert FIPS 64K is a Java Card 2.2 and Open Platform v2.0.1' compliant smart card module. It supports, at a minimum, Triple-DES, AES, DSA, and RSA algorithms with on-card key generation. The Sm@rtCafé Expert FIPS 64 is suitable for government and commercial applications." |
535 | IBM Corporation IBM/Tivoli PO Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Mike Thomas
|
Version 0.9.7c |
2084-B16 (zSeries 990 systems) w/ RHEL 4.0 (32-bit); 2084-B16 (zSeries 990 systems) w/ RHEL 4.0 (64-bit); 2084-B16 (zSeries 990 systems) w/ SLES 9.1 (32-bit); 2084-B16 (zSeries 990 systems) w/ SLES 9.1 (64-bit) | 12/4/2006 |
SHA-1     
(BYTE-only) "ICC is a C language implementation of cryptographic functions which uses the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 03/22/07: Update the implementation name and version number; |
534 | Reflex Magnetics Ltd 31-33 Priory Park Road London, NW6 7HP United Kingdom -Richard Green
-Andy Campbell
|
Version 1.0.0.61103 |
Standard Dell Optiplex 170L machine running Microsoft Windows XP SP2 w/ Microsoft Windows XP SP2 | 11/28/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Implementation Description" |
533 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 3.1 |
ARM Processor w/ Palm OS 5 | 11/28/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "This is a software implementation of cryptographic algorithms providing C language interface." |
532 | NetLogic Microsystems 18920 Forge Drive Cupertino, CA 95014 USA -Mark Litvack
|
Part # P/N XLR Version B2 |
N/A | 11/28/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "NetLogic Microsystems’ XLR series of processors offer high-throughput general purpose processing with an array of integrated I/O. They combine the power of innovative multi-core and multi-threaded architecture with the simplicity of a leading edge, general purpose MIPS64-based machine enabling wire speed performance." |
531 | Gemalto 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version HM 4v1; SM 1v1 (Firmware) |
Proprietary | 11/13/2006 |
SHA-1     
(BYTE-only) "This algorithm is used in the SafesITe Large Memory Dual Interface Open Platform card usable for PKI applications (network access), digital signature and access control (personal identification). This card provides: Java Card and Global Platform compliance, contact and contactless (ISO14443) communication interfaces, large data storage capacity." |
530 | Broadcom Corporation 16215 Alton Parkway Irvine, CA 92618 USA -Steve Goodell
|
Version V0 (Firmware) |
ARM926EJS | 11/13/2006 |
SHA-256 
(BYTE-only) "The BCM5890 Secure Application Processor is a highly integrated system on a chip designed to execute secure applications." |
529 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1 |
Intel Pentium 4 w/ Red Hat Enterprise Linux v4 | 11/13/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The F-Secure Kernel Mode Cryptographic Driver for Linux is a 140-2 Level 1 compliant software module, which resides at the Kernel Mode level of the Linux OS and provides a number of cryptographic services accessible by other kernel drivers through an Application Programming Interface." 11/22/06:Update Imp. name, and Imp. description. |
527 | Broadcom Corporation 16215 Alton Parkway Irvine, CA 92618 USA -Steve Goodell
|
Part # BCM5890, Version A0 |
N/A | 11/13/2006 |
SHA-1     
(BYTE-only) "The BCM5890 Secure Application Processor is a highly integrated system on a chip designed to execute secure applications." |
526 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA |
Version 5.2 Gold |
Intel® CoreTM 2 Duo (x64) w/ Microsoft Windows XP SP2; Intel® CoreTM 2 Duo (x64) w/ Mac OS 10.4; Intel® CoreTM 2 Duo (x64) w/ Red Hat Enterprise Linux 4 | 11/13/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Intel® IPP for cryptography is a software library optimized for IA-32, IA-64, and Intel® 64 architectures and running on Windows*, Linux*, and Mac OS* operating systems. The library has cross-platform and cross operating system API for routines commonly used for cryptographic operations." 03/14/07: Update Vendor information; |
525 | Sagem Orga Heinz-Nixdorf-Ring 1 Paderborn, 33106 Germany -Swantje Missfeldt
|
Version J-IDMark 64 Open 01016221 (Firmware) |
AT58803-H-AA | 11/8/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "An implementation of the SHA-1 and SHA-256 for use in the J-IDMark 64 Open smart card cryptographic module." |
524 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 4.2 (Firmware) |
Intel PXA901 312MHz processor w/ BlackBerry OS 4.2 | 11/8/2006 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "BlackBerry(r) is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. The BlackBerry(r) Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry(r) Wireless Handhelds." |
523 | SCsquare Ltd. 2A Habarzel St. Ramat Hahayal Tel Aviv, 69710 Israel -Yossi Fixman
|
Version 1.0 (Firmware) |
SLE66CX-PE-CE | 10/27/2006 |
SHA-1     
(BYTE-only) "Apollo OS is a highly secure smart card operating system, providing a platform for applications requiring secure PKI and Digital Signature technology. Apollo OS provides a solution for National Identification cards, ePassports and Employee Cards. Apollo OS ensures secure communications and supports on-card crypto-engine symmetric algorithms." |
521 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Security Certifications Team
|
Version 3.8.4 (Firmware) |
Intel PXA901 312MHz processor | 10/27/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry(r) is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. The BlackBerry(r) Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry(r) Wireless Handhelds." |
520 | Trust Digital 7900 Westpark Drive, Suite A50 McLean, VA 22102 USA -Norm Laudermilch
|
Version 1.0 |
Intel Xscale w/ Microsoft Windows Mobile Version 5.0; Intel Xscale w/ Microsoft Windows Mobile Version 5.0 Smartphone edition | 10/25/2006 |
SHA-1     
(BYTE-only) "Award winning Trusted Mobility Server allows an organization to centrally manage an unlimited number of PDA handheld or wireless devices. Access control, encryption, Data Wipe and many more device functionality can all be set and pushed to the device. Trust Digital offers security for Palm, Pocket PC, Blackberry (RIM), Symbian and all windows OSs." |
519 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Hazem Hassan
-Wayne Whitlock
|
Version 3.0 (Firmware) |
Philips P5CT072 Secure Triple Interface Smart Card Controller | 10/25/2006 |
SHA-1     
(BYTE-only) "SCCOS is a state-of-the-art operating system that offers wide range of authentication services together with the highest levels of security. It offers powerful implementaions for public and secret key encryption supporting RSA, DSA, Diffie-Hellman, SHA-1, Triple-DES, and AES." |
518 | SCsquare Ltd. 2A Habarzel St. Ramat Hahayal Tel Aviv, 69710 Israel -Yossi Fixman
|
Part # 1.0 |
N/A | 10/20/2006 |
SHA-1     
(BYTE-only) "Apollo OS is a highly secure smart card operating system, providing a platform for applications requiring secure PKI and Digital Signature technology. Apollo OS provides a solution for National Identification cards, ePassports and Employee Cards. Apollo OS ensures secure communications and supports on-card crypto-engine symmetric algorithms." |
517 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Juan Asenjo
|
Version 1.00 (Firmware) |
IBM PowerPC 405 | 10/20/2006 |
SHA-1     
(BYTE-only) "Implementation Description" |
516 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.7.1, 3.8.1, 3.10.3, 3.11.0 FC6, 3.11.0 OSX, and 3.11.0 WIN32, |
Apple MacBook Pro 15" w/ Mac OS X 10.4.8 (Version 3.7.1 only) and 10.4.10 (Version 3.8.1 only); Dell Optiplex GX280 using an Intel Pentium 4 3.2 GHz Processor w/ Windows XP Professional 2002 SP2; Intel Core 2 Duo 2.33 GHz w/ Mac OS X 10.5 Apple MacBook Pro 15" (Version 3.10.3 only); Dual Core Xeon 3060 w/ Linux, 32 bit Fedora Core 6 (Version 3.11.0 FC6 only); Intel Core 2 Duo 2.33 GHz w/ Mac OS X 10.5 Apple MacBook Pro 15" (Version 3.11.0 OSX only); Dell PowerEdge 860 with Dual Core Xeon 3060 w/ Windows XP Professional 2002 SP-2 (Version 3.11.0 WIN32 only); Dell PowerEdge 860 with Dual Core Xeon 3060 w/ Windows XP Professional 2002 SP2 (Version 3.10.2 WIN32 only) | 10/20/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." 05/11/07: Update vendor POC information; |
515 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Sean Gibbons
|
Version 1.0 (Firmware) |
FreeScale Power Architecture Processor w/ Lexmark ver. 2.4 O/S; IBM PowerPC w/ Lexmark ver. 2.4 O/S | 11/8/2006 |
SHA-1     
(BYTE-only) "The Lexmark T640, T642, T644, W840, C920, C534, C772, X644e, X646e, X646dte, X850e, X852e, and X854e Cryptographic Platforms provide the cryptographic solution for the printer's secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
514 | Gemalto 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 3v1 (Firmware) |
A1002431 | 10/16/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Cyberflex e-gate V3 smart card can be employed in solutions, which provide secure PKI (public key infrastructure) and digital signature technology. Cyberflex e-gate V3 serves as a highly portable, secure token for enhancing the security of network access and ensuring secure electronic comunications." |
513 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA -Ed Smith
|
Version 01.01.05 |
PowerPC w/ Linux v2.4 | 10/13/2006 |
SHA-1     
(BYTE-only) "The ViaSat Enhanced Bandwidth Efficient Modem (EBEM-500) series Satcom Modem provides the latest in efficient modulation and coding for point-to-point Satcom connections. The EBEM-500 series offers embedded encryption integrating the security functions into the modem to provide an integrated secure Satcom modem product." |
512 | Schweitzer Engineering Laboratories, Inc. 2350 NE Hopkins Court Pullman, WA 99163 USA -Joe Casebolt
|
Version 0.146 (Firmware) |
FPGA | 10/11/2006 |
SHA-1     
(BYTE-only) "The SEL-3021 Serial Encrypting Transceiver is an EIA-232 bump-in-the-wire encryption module. Use the SEL-3021 to protect meters, protective relays, Programmable Logic Controllers (PLC), Remote Terminal Units (RTU), and computers from unauthorized access." |
511 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.0 (Firmware) |
Intel Xeon | 10/11/2006 |
SHA-512 
(BYTE-only) "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for Decru DataFort products. Decru DataFort is a storage security appliance that uses encryption, authentication, secure access controls, and secure logging to protect networked storage in NAS, SAN, DAS and Tape environments." 04/18/07: Change implementation name; |
510 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Kim Trites
-Christopher D. Wood
|
Version 7.2 |
UltraSPARC-llli 1.34 GHz processor with 512KB external cache w/ Sun Solaris 10 with SUN JRE 5.0; Intel® Pentium® D dual-core 3.2 GHz CPU w/ Microsoft Windows XP Professional with SUN JRE 5.0 | 10/13/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Entrust Authority Security Toolkit for the Java Platform provides a FIPS certified secure and trusted framework for successful e-business development of high performance applications." |
509 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version NGX (R60) w hotfix HFA-03 (Firmware) |
Celeron w/ IPSO v3.9; Xeon w/ IPSO v3.9 | 10/6/2006 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 module running on Nokia's IPSO security hardened operating system" |
508 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version v 3.9 (Firmware) |
Celeron w/ IPSO v3.9; Xeon w/ IPSO v3.9 | 10/5/2006 |
SHA-1     
(BYTE-only) "Nokia security hardened operating system" |
507 | L-3 Communications Linkabit 3033 Science Park Road San Diego, CA 92121 USA -Rick Roane
|
Version TF1-SSH-VX-SRC-2-0-0-001 |
MPC7457 w/ VxWorks | 10/5/2006 |
SHA-1     
(BYTE-only) "MPM-1000 SATCOM IP Modem" |
506 | Silicon Graphics Inc. 2750 Blue Water Road Eagan, MN 55121 USA -Lori Gilbertson
|
Version openssl 0.9.7a 43.10 |
Intel Itanium2 w/ Red Hat Enterprise Linux AS Version 4 Update 4 | 9/14/2006 |
SHA-1     
(BYTE-only) "TDES, AES, SHA-1, and RSA as used by RHEL AS V4 U4 on SGI Altix servers." |
505 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 |
Intel Pentium w/ Linux; Intel Pentium w/ MS Windows XP | 9/8/2006 |
SHA-1     
(BYTE-only) "Client algorithm suite." |
504 | RELM Wireless Corporation 7100 Technology Drive West Melbourne, FL 32904 USA -Jim Spence
|
Version 721-05076-0000 (Firmware) |
DSP Processor | 9/8/2006 |
SHA-1     
(BYTE-only) "The DPHx Radio with OTAR is a multi-chip standalone cryptographic module encased in an opaque commercial grade enclosure. As a secure radio, the primary purpose for this device is to provide encrypted digital communication." |
503 | Gemalto Avenue du Pic de Bertagne, BP 100 Gemenos, Cedex 13881 France -Anthony Vella
|
Version GX4-S_E005 (MSA029) (Firmware) |
Samsung S3CC9TC | 9/5/2006 |
SHA-1     
(BYTE-only) "This implementation is dedicated to provide the crypto algorithm on the GemXpresso R4 E36/E72 PK Java card product through the Java Card 2.2.1 API. It provides Random Number generation, 3DES, AES, SHA-1 and RSA up to 2048 bits key length as well as RSA On Board Key generation up to 2048 bits long." |
502 | Novell, Inc. 1800 South Novell Place Provo, UT 84606 USA -Srinivas Vedula
|
Version 2.7.1 |
Intel Celeron 325 w/ Netware 6.5 w/ SP3; AMD Athlon XP 1800+ w/ Red Hat Enterprise Linux Advanced Server 3.0; Intel Celeron M w/ MS Windows 2000 w/ SP4; Intel Celeron M w/ MS Windows XP w/ SP2; UltraSparc IIe w/ Trusted Solaris 8; Pentium 4 w/ MS Windows Server 2000 with SP3 and Q326886 Hot Fix; AMD Opteron 246 w/ SuSE Enterprise Linux 8 | 9/5/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Novell International Cryptographic Infrastructure (NICI) is a cryptographic module written in C that employs the BSAFE library to provides keys, algorithms, key storage and usage mechanisms, and a key management system." |
501 | Polycom, Inc. 4750 Willow Road Pleasanton, CA 94588 USA -Robert V. Seiler
|
Version 1.0 (Firmware) |
Equator BSP-15 | 8/30/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) "Cryptographic Software for Polycom VSX Systems" |
500 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2130 |
N/A | 8/30/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2130 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
499 | Check Point Software Technologies Ltd. 5 Choke Cherry Road Rockville, MD 20850 USA -Wendi Ittah
-Malcolm Levy
|
Version 1.2 and 1.3 |
Intel Celeron M w/ Windows XP SP2 (version 1.2 only); Intel Celeron M w/ Windows 2000 SP4 (version 1.2 only); Intel X-Scale PXA270 w/ Windows Mobile 5 (version 1.2 only); Texas Instruments OMAP 850 w/ Windows Mobile 5 (version 1.2 only); Nokia E61 ARM9 CPU w/ Symbian 9 (version 1.2 only); AMD Athlon X2 w/ Windows Vista Ultimate (version 1.3 only); Intel Celeron w/ Windows Server 2003 SP2 (version 1.3 only); Intel Core 2 Duo w/ Mac OS X v10.5 (version 1.3 only); Marvell PXA310 w/ Windows Mobile 6.0; TI OMAP 850 w/ Windows Mobile 6.0 | 8/30/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Check Point Crypto Core is a 140-2 Level 1 cryptographic module for Win 2K3/Vista, Check Point Pre-Boot Environment, Win Mobile 6 and Mac OS X. The module provides cryptographic services accessible in pre-boot mode, kernel mode and user mode on the respective platforms through implementation of platform specific binaries." 10/02/06: Add new OS/Processor; |
498 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 |
Intel ARM w/ MS Windows CE 4.0; Intel ARM w/ MS Windows CE 3.0; Intel Pentium w/ MS Windows 2000 | 8/24/2006 |
SHA-1     
(BYTE-only) "Client algorithm suite." |
497 | IBM Corporation IBM/Tivoli PO Box 3499 Australia Fair Southport, Queensland 4215 Australia -Peter Waltenberg
-Mike Thomas
|
Version 0.9.7c |
AMD Athlon XP (32-bit) w/ Red Hat Enterprise Linux 4.0; UltraSparc IIe w/ Solaris 9 (Using 32-bit binary); IBM POWER5 (dual core) w/ Red Hat Enterprise Linux 4.0 (32-bit binary); UltraSparc IIe w/ Solaris 9 (Using 64-bit binary); HP PA-8600 w/ HPUX 11i (using 32-bit binary); IBM POWER5 (dual core) w/ Red Hat Enterprise Linux 4.0 (using 64-bit binary); HP PA-8600 w/ HPUX 11i (using 64-bit binary); Intel Pentium D w/ Red Hat Enterprise Linux 4.0 (using 64-bit binary); AMD Athlon XP w/ Windows 2003 SP1; Intel Pentium D w/ Windows 2003 SP1; IBM POWER5 (dual core) w/ AIX 5.2 (using 32-bit binary); AMD Opteron w/ SuSe Linux Enterprise Server 9.0 (using 64-bit binary); IBM POWER5 (dual core) w/ AIX 5.2 (using 64-bit binary); Intel Pentium 4 w/ SuSe Linux Enterprise Server 9.0; IBM POWER5 (dual core) w/ SuSe Linux Enterprise Server 9.1 (using 32-bit binary); IBM POWER5 (dual core) w/ SuSe Linux Enterprise Server 9.1 (using 64-bit binary) | 8/24/2006 |
SHA-1     
(BYTE-only) "ICC is a C language implementation of cryptographic functions which uses the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider." 03/22/07: Update the implementation name and version number; |
496 | Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version E304 (Firmware) Part # 77 |
ID-One Cosmo 64 v5 | 8/24/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The ID-One Cosmo Chip Platform is a single-chip multi-application cryptographic module for smart cards, specifically designed for identity and government market needs. The module offers a highly secure architecture together with cryptographic services such as 3DES128 and 3DES192, AES 256, RSA2048 with on-board key generation, and ECDSA (GFP)." |
495 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Tony Ureche
|
Version Build #5466 |
Intel Pentium D w/ Microsoft Windows Vista Ultimate Edition Version 6, Beta 2; Intel Pentium 4 w/ Microsoft Windows Vista Ultimate Edition Version 6, Beta 2 | 8/4/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "BitLocker(TM) is a security feature in Windows Vista® that provides full volume encryption to address lost or stolen computer scenarios." |
494 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 (Firmware) |
AMD MIPS w/ Fortress Proprietary | 8/3/2006 |
SHA-1     
(BYTE-only) "Provides Cryptographic operations for the Fortress Technologies ES520." |
493 | Icom Inc. 1-1-32 Kamiminami Hirano-ku Osaka, Osaka 547-0003 Japan -Chris Lougee
|
Version 1.0 (Firmware) |
HD64F2239 (16bit CISC) | 7/28/2006 |
SHA-1     
(BYTE-only) "Implementation Description" |
492 | Data-Pac Mailing Systems Corporation 1217 Bay Rd Webster, NY 14580 USA -Ken Yankloski
-John Keirsbilck
|
Version 1.0.20.5 (Firmware) |
Dallas DS5250 | 7/28/2006 |
SHA-1     
(BYTE-only) The SHA-1 implementation does not process message lengths > 956 bytes. "Embedded Multi-chip Cryptographic Device Used For Postage Evidencing" 03/21/07: Update version number. |
491 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 3.0 |
ARM Processor w/ Phillips RTK-E | 7/25/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications." |
490 | Open Source Software Institute Administrative Office P.O. Box 547 Oxford, MS 38655 USA -John Weathersby
|
Version 1.1 |
PA RISC w/ HP D Class 9000 w/ HP-UX Release B.11.11; Intel x86 w/ Linux Kernel Version: 2.4.21 w/ SuSE Linux 9.0 | 7/20/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Object Module Library is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website." |
489 | FRAMA AG Unterdorf Lauperswil, Bern CH-3438 Switzerland -Beat Waelti
-Markus Arn
|
Version V1.0.6 (Firmware) Part # HW-Version 2.4 |
Firmware: running on built-in Fujitsu MB91191APF micro controller | 7/20/2006 |
SHA-1     
(BYTE-only) "The PSD-I (Postal Security Device-I) is a hardware crypto module. All algorithms to be tested are implemented in firmware. The PSD-I contains a physical noise source which is used to seed the RNG. The PSD-I supports: DES, 3DES - FIPS 46-3/FIPS81; RSA - PKCS#1 V1.5; SHA-1 - FIPS 180-1; RNG - FIPS 186-2." |
488 | Attachmate Corporation 1500 Dexter Ave N Seattle, WA 98109 USA -Sharon Xia
|
Version 1.0 |
AMD 275 Opteron 2.2GHz, Dual Core processor (HP ProLiant DL145R2 2G Server) w/ Red Hat Linux 4x64 (RHELx64) and Sun Java Runtime 1.5.0; Apple Power Macintosh G4 w/ Mac OS X 10.4.3 and Apple Java Runtime 1.5.0; Intel Xeon 2.80GHz/800MHz, dual processor (HP ProLiant DL140) w/ Windows XP and Sun Java Runtime 1.5.0 | 7/20/2006 |
SHA-1     
(BYTE-only) "Reflection for the Web provides terminal emulation from a web browser. With this server-based solution you can connect local or remote users to applications on IBM, HP, UNIX, and OpenVMS hosts. You can also use its comprehensive management, security, and customization features to boost IT efficiency and user productivity." 04/28/08: Update implementation version number; |
487 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Tom Gilbert
|
Version 1.0 |
Intel Pentium w/ Windows 2000 | 7/14/2006 |
SHA-1     
(BYTE-only) "Provides cryptographic operations for the BorderGuard X.509 VPN Client which enables a user to establish a secure, end-to-end encrypted tunnel with a BorderGuard Network Appliance." |
486 | Attachmate Corporation 1500 Dexter Ave N Seattle, WA 98109 USA -Zeke Evans
-Joe Silagi
|
Version 1.0 |
Intel Itanium w/ HP-UX 11iv2 (IA64); Intel Itanium w/ Windows 2003 Server SP1 (IA64); Intel Pentium D w/ Windows 2003 Server SP1 (x64); Intel Pentium 4 w/ Windows 2003 Server SP1; AMD Opteron w/ Solaris 10; UltraSPARC w/ Solaris 8; AMD Opteron w/ SuSE Linux Enterprise Server 9.0 (x64); Intel Pentium 4 w/ SuSE Linux Enterprise Server 9.0; Intel Itanium w/ Red Hat Enterprise Linux 4.0 (IA64); Intel Pentium D w/ Red Hat Enterprise Linux 4.0 (x64); Intel Pentium 4 w/ Red Hat Enterprise Linux 4.0; PA-RISC w/ HP-UX 11iv1; Intel Pentium 4 w/ Sun Solaris 10 | 7/14/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "The Attachmate Crypto Module is used in a range of solutions from Attachmate, provider of host connectivity, systems and security management, and PC lifecycle management products." |
485 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA -Larry Hamid
|
Version v3.0 (Firmware) |
32-bit ARM946E MCU | 7/7/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Stealth MXP is a USB powered Portable Security Device with authentication and cryptographic services. It provides secure storage and digital identity operations for enterprise security and user authentication via biometric and password." 02/29/08: Update vendor information; |
484 | 3e Technologies International, Inc. 700 King Farm Blvd, Suite 600 Rockville, MD 20850 USA -Ryon Coleman
|
Version 3.0 |
Intel Pentium III Mobile w/ Windows 2000 Server SP4; Intel Xeon Quad CPU server w/ Windows 2003 Server SP1 | 6/30/2006 |
SHA-1     
(BYTE-only) "The Security Server is a software program that runs as a Windows service. It authenticates wireless users when they log onto the network, and distributes dynamic per session keys for the user. The Security Server can be run on Windows 2000, Windows 2000 Server, Windows 2003 Server, or Windows XP." |
483 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 (Firmware) |
Intel Processor | 6/30/2006 |
SHA-1     
(BYTE-only) "Gateway Agorithm Suite." |
482 | Encryption Solutions 1740 East Garry Ave., #110 Santa Ana, CA 92705 USA -Robert Stedron
|
Version 1.0 |
AMD Athlon 64 w/Windows XP | 6/30/2006 |
SHA-1     
(BYTE-only) "The implementation is a standard SHA-1 byte oriented implementation. It consists of 3 main functions, Init, Update, and Final." |
481 | Saflink Corporation 12413 Willows Road NE, Ste 300 Kirkland, WA 98034 United States -Bob Turbeville
|
Version 0003 (Firmware) |
DS80C400 | 6/30/2006 |
SHA-1     
(BYTE-only) "SHA Hashing Algorithm for use in the SureAccess Assembly Processor" |
480 | BSI2000, Inc. 12600 W. Colfax Ave., #B410 Lakewood, CO 80215 USA -Glenn Junik
|
Version 1.0 (Firmware) |
Dallas Secure Microcontroller | 7/14/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto2000 has been specifically designed to enable cryptographically secure transactions with optical cars via BSI2000's Secure Optical Card Protocol. In addtion to this specialty, the Crypto2000 is versatile enough to be used whenever highly-secure cryptographic operations are required." |
479 | Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 USA -Stephen Lewis
|
Version 1.2.14 |
Intel Pentium 4M w/ Windows XP SP2 | 6/22/2006 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BIT) SHA-512  (BYTE-only) "The Proofpoint Security Library supports:(a) asymmetric algorithms for digital signature and key agreement using Elliptic Curve Cryptography and Conventional Cryptography (b) symmetric algorithms for integrity and encryption (c) a secure pseudo random number generator and entropy gathering daemon provide support for securely generating key material." 11/12/08: Update vendor and implementation information; |
478 | Global Relief Technologies, LLC. 40 Congress Street, Suite 300 Portsmouth, NH 03801 USA -Chip Peter
|
Version 2.3.0 |
Intel® PXA270 w/ Microsoft® Windows Mobile Version 5.0 | 6/22/2006 |
SHA-1     
(BYTE-only) "Rapid Data Management Software is deployed on hand-held PDA and cellular communications devices for collecting time-sensitive data, which is uploaded to a server via a TLS connection using the FIPS-approved algorithms: TDES, RSA, and SHA-1." |
477 | Siemens PLM Software 5800 Granite Parkway Suite 600 Plano, TX 75024 USA -Kevin White
|
Version 1.1.1 |
64-bit SPARC IIe w/ Solaris 8; 32-bit Intel Pentium 4M w/ Windows XP SP2; 64-bit SPARC Iie w/Solaris 10 | 6/22/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals." |
476 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 1.0 |
N/A | 6/22/2006 |
SHA-1     
(BYTE-only) "Hifn's 8170 is a high performance low latency cryptographic security processor intended specifically for VoIP applications. It implements all of the cryptographic protocols necessary to implement VoIP security including SRTP/SRTCP, IPsec, TLS/SSL, DTLS and public key operations." |
475 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 1.0 |
N/A | 6/22/2006 |
SHA-1     
(BYTE-only) "Hifn's 7870 is a high performance low latency cryptographic security processor intended specifically for VoIP applications. It implements all of the cryptographic protocols necessary to implement VoIP security including SRTP/SRTCP, IPsec, TLS/SSL, DTLS and public key operations." |
474 | Nokia Enterprise Solutions 102 Corporate Park Dr. White Plains, NY 10604 USA -Jeffrey Ward
|
Version NGX (R60) with hot fix HFA-03 (Firmware) |
Nokia VPN Appliance, Pentium III | 6/30/2006 |
SHA-1     
(BYTE-only) "Check Point's VPN-1 module running on Nokia's IPSO security hardened operating system" |
473 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Version 1.0 (Firmware) |
PPC440GX | 6/22/2006 |
SHA-256 
(BYTE-only) "SHA-256" 10/05/07: Update vendor and POC information; |
472 | Sharp Laboratories of Europe Ltd. Edmund Halley Road Oxford Science Park Oxford, OX4 4GB United Kingdom -Anthony Hull
|
Version SLE-SHA1-01 (Firmware) |
SM4128 chip | 6/7/2006 |
SHA-1     
(BYTE-only) "An implementation of the SHA-1 hashing algorithm as defined in FIPS 180-2." |
471 | IBM Corp. 11505 Burnet Rd. Austin, TX 78758 USA -Jacqueline Wilson
-Martin Clausen
|
Version 3.1 |
POWER3-II w/ AIX 5200-07(64-bit kernel); POWER3-II w/ AIX 5200-07(32-bit kernel); POWER3-II w/ AIX 5300-03(32-bit kernel); POWER3-II w/ AIX 5300-03(64-bit kernel) | 6/1/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "IBM CryptoLite for C is a C software package providing advanced cryptographic services in a configurable footprint. CryptoLite supports public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms through a simple programming interface." |
470 | Atmel Maxwell Building Scottish Technology Park East Kilbride, Scotland, GB -Steve Mitchell
|
Version Atmel Toolbox, Version 00.03.01 (Firmware) Part # AT90SC144144CT, Version AdvX V01.01 |
AT90SC144144CT w/ Citadel | 6/1/2006 |
SHA-1     
(BYTE-only) "Personal Identity Verification Smart Card, HSPD-12 implementation. Secure card OS, fully compliant with NIST 800-73-1 and FIPS PUB 201-1 requirements. SHA-1 is implemented in AT90SC144144CT and AT90SC12872RCFT." |
469 | Broadcom Corporation 16215 Alton Parkway Irvine, CA 92618 USA -Steve Goodell
|
Part # BCM5825; Version A1 |
N/A | 6/1/2006 |
SHA-1     
(BYTE-only) "The BCM5825 is a high-performance security processor optimized to provide multi-protocol cryptographic acceleration for VPN and e-commerce applications." |
468 | Kasten Chase Applied Research, Ltd. 5100 Orbitor Drive Mississauga, Ontario L4W 4Z4 Canada -Steve Demmery
|
Version 2.0 (Firmware) |
IBM PPC405GPR | 6/1/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "KCCE is an independent, executable cryptographic module that exists variously as a dynamic linked library (dll), a shared library, a driver and as firmware. KCCE provides software designers with a comprehensive API that ensures secure cryptographic application development, for a wide range of operating systems, without undue complexity." |
467 | Ceragon Networks Ltd 24 Raoul Wallenberg Street Tel-Aviv, Tel-Aviv 69719 Israel -Yossi Sarusi
-Boris Radin
|
Version 1.0 (Firmware) |
MPC 8250 Motorola power-pc | 6/1/2006 |
SHA-1     
(BYTE-only) "High capacity broadband wireless system which provide FIPS compliant secure operation." |
466 | Sharp Laboratories of Europe Ltd. Edmund Halley Road Oxford Science Park Oxford, OX4 4GB United Kingdom -Anthony Hull
|
Version 1.1.03 (Firmware) |
SM4128 chip | 5/15/2006 |
SHA-1     
(BYTE-only) "An implementation of the SHA-1 hashing algorithm as defined in FIPS 180-2." |
465 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Bill McIntosh
|
Version 1.0 (Firmware) |
MIPS | 5/12/2006 |
SHA-1     
(BYTE-only) "Fortress FC-X Algorithm Suite" |
464 | KoolSpan Inc. 4962 Fairmont Ave., 2nd Floor Bethesda, Maryland 20814 United States -Paul Benware
|
Version 1.0 (Firmware) |
Altera FPGA processor | 5/8/2006 |
SHA-1     
(BYTE-only) "KoolSpan SecurEdge Lock Algorithms is a suite of Cryptographic Algorithms for use by the KoolSpan SecureEdge Lock." |
463 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Tom Gilbert
|
Version 1.0 |
32 bit intel processor w/ Windows XP | 4/28/2006 |
SHA-1     
(BYTE-only) "Provides cryptographic operations for the BorderGuard X.509 VPN Client which enables a user to establish a secure, end-to-end encrypted tunnel with a BorderGuard Network Appliance." |
462 | RELM Wireless Corporation 7100 Technology Drive West Melbourne, FL 32904 USA -Jim Spence
-Tess Zagaruyka
|
Version 721-05070-0000 (Firmware) |
Proprietary Processor | 4/28/2006 |
SHA-1     
(BYTE-only) "SHA-1 hash algorithm designed for use in BK Radio secure communications products." |
461 | nuBridges, Inc. 1000 Abernathy Road Suite 250 Atlanta, GA 30328 USA -Gary Palgon
-David Harrison
|
Version 2.0 |
PA-RISC w/ HP-UX 11 | 4/28/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "oftware implementation of cryptographic algorithms" 08/09/07: Change vendor information and implementation name; |
460 | Sagem Orga Am Hoppenhof 33 Paderborn, 33104 Germany -Fabien Guichon
|
Part # P/N AT58829-C-AA, Version J-IDMARK64 IDT 005 |
N/A | 4/24/2006 |
SHA-256 
(BYTE-only) "An implementation of the SHA-256 algorithm for use in the J-IDMark 64 smart card cryptographic module." |
459 | Sagem Orga Am Hoppenhof 33 Paderborn, 33104 Germany -Fabien Guichon
|
Part # P/N AT58829-C-AA, Version J-IDMARK64 IDT 005 |
N/A | 4/24/2006 |
SHA-1     
(BYTE-only) "An implementation of the SHA-1 algorithm for use in the J-IDMark 64 smart card cryptographic module." |
458 | Athena Smartcard Solutions 6F Marutaya Building 6-9 Yokoyama-Cho Tokyo, Hachioji 192-00081 Japan -Naomi Matsumoto
|
Version 2.4.6 (Firmware) Part # HW P/N AE46C1 V0.1 |
OS755 on AE46C | 4/24/2006 |
SHA-1     
(BYTE-only) "The Hitachi One-PassporPt KI Card Application on Athena Smartcard Solutions OS755f or RenesasX Mobile cardm odulei s a multimedia card with flash memory and SD card interface. It stores digital certificates that can be used by external applications on both PC and PDA, and offers 1024-bit RSA key gen with strong prime numbers (ANSI X9.31), RSA PKCS #1 and TDES CBC no pad encrypt and decrypt." 02/09/07: Update vendor Info. |
457 | Safenet Inc. Safenet Australia 28 Greg Chappell Drive Burleigh Heads, Queensland 4220 Australia -Marcus Alick
-Tony Huynh
|
Version 2.02.00 (Firmware) |
IOP80321, ARM | 4/7/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PCI HSM" |
456 | Ecutel Systems, Inc. 2300 Corporate Park Drive, Suite 410 Herndon, Virginia 20171 USA -Dzung Tran
|
Version 1.0 |
Pentium Processor w/ Windows XP; Intel PXA263 Processor w/ Windows Mobile; Pentium processor w/ Redhat Linux | 4/7/2006 |
SHA-1     
(BYTE-only) "Ecutel Algorithms is a software algorithm implementation that supplies cryptographic functionality to Ecutel Viatores System." |
455 | Neopost Industrie 113 Rue Jean Marin Naudin Bagneux, 92220 France -Thierry Le Jaoudour
|
Version V50.0 (Firmware) |
Pentium 4 | 4/7/2006 |
SHA-1     
(BYTE-only) "Cryptographic firmware module used in the N30i/N30ig - 135/136 Postage Meter." |
454 | 3e Technologies International, Inc. 700 King Farm Blvd, Suite 600 Rockville, MD 20850 USA -Tiebing Zhang
|
Version 1.0 (Firmware) |
CSR BC03MM Chip | 4/7/2006 |
SHA-1     
(BYTE-only) "For use in Bluetooth Crypto Library" |
453 | Sterling Commerce, Inc. 4600 Lakehurst Court Dublin, Ohio 43016-2000 USA -Garry Mayo
|
Version 1.0 |
HP PA-8800 w/ HP-UX 11.11; POWER5+ w/ IBM AIX 5.3; UltraSPARC II w/ Sun Solaris 10 | 4/7/2006 |
SHA-1     
(BYTE-only) "Connect:Direct Secure+ is a cryptographic suite for Connect:Direct that adds enhanced security options such as mutual authentication, data encryption and cryptographic message integrity checking." |
452 | Sterling Commerce, Inc. 4600 Lakehurst Court Dublin, Ohio 43016-2000 USA -Garry Mayo
|
Version 1.0 |
UltraSPARC II w/ Sun Solaris 10; POWER5+ w/ IBM AIX 5.3 | 4/7/2006 |
SHA-1     
(BYTE-only) "Connect:Direct Secure+ is a cryptographic suite for Connect:Direct that adds enhanced security options such as mutual authentication, data encryption and cryptographic message integrity checking." 10/17/06: Update the OS/Processor |
451 | Sterling Commerce, Inc. 4600 Lakehurst Court Dublin, Ohio 43016-2000 USA -Garry Mayo
|
Version 1.0 |
HP PA-8800 w/ HP-UX 11.11; POWER5+ w/ IBM AIX 5.3; UltraSPARC II w/ Sun Solaris 10; IBM z900 Central Processor w/ IBM z/OS version 1.6 | 4/7/2006 |
SHA-1     
(BYTE-only) "Connect:Direct Secure+ is a cryptographic suite for Connect:Direct that adds enhanced security options such as mutual authentication, data encryption and cryptographic message integrity checking." Does not support the hashing of NULL messages |
450 | TecSec, Incorporated 1953 Gallows Road, Suite 220 Vienna, VA 22182 USA -Roger Butler
|
Version 1.0 |
Pentium III 933 MHz processor w/ Windows 2000 | 4/3/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CKM Algorithms is a library that provides FIPS Approved algorithms for use in the CKM Cryptographic Module." |
449 | S1 Corporation S1 Bldg. 168, Sunhwa-dong, Jung-gu Seoul, 100-130 Korea -Lee JunSang
-Kim SungHoon
|
Version 1.0 |
SamSung Electronics S3CC9P9 microcontroller w/ Java Card 2.2.1 | 3/29/2006 |
SHA-1     
(BYTE-only) "S1 Smartcard is a Java Card 2.2.1 and Open Platform v2.0.1' compliant smart card module. It supports, at a minimum, Triple-DES, and RSA algorithms with on-card key generation. S1 Smartcard is suitable for government and corporate identification, payment and banking, health care, and Web applications." |
448 | EmailFund, Inc. Department of Mathematics Yonsei University Seoul, 120-749 Korea -Sangmun Kim
|
Version Beta 2.16.01 |
x86 platform w/ RedHat Linux 7.2; x86 platform w/ Redhat Linux 7.0 | 3/29/2006 |
SHA-1     
(BYTE-only) "Beta version of wireless PKI security software product taking no longer than 900 ms for digital signature generation. The software performs the function of user authentication, non-repudiation, integrity and cryptographic primitives to secure wireless Internet transaction through a wireless communication device." |
447 | EmailFund, Inc. Department of Mathematics Yonsei University Seoul, 120-749 Korea -Sangmun Kim
|
Version Beta 2.16.01 |
Motorola Dragonball EZ MC68EZ328 w/ Palm OS 3.3 | 3/29/2006 |
SHA-1     
(BYTE-only) "Beta version of wireless PKI security software product taking no longer than 900 ms for digital signature generation. The software performs the function of user authentication, non-repudiation, integrity and cryptographic primitives to secure wireless Internet transaction through a wireless communication device." |
446 | Sharp Laboratories of Europe Ltd. Edmund Halley Road Oxford Science Park Oxford, OX4 4GB United Kingdom -Anthony Hull
|
Version 1.1 (Firmware) |
SM4128 chip | 3/29/2006 |
SHA-1     
(BYTE-only) "An implementation of the SHA-1 hashing algorithm as defined in FIPS 180-2." |
445 | Voltage Security, Inc. 1070 Arastradero Road, Suite 100 Palo Alto, CA 94304 USA -Luther Martin
|
Version 2.5 |
Intel Pentium Processor w/ Windows XP Pro SP2; Intel Pentium Processor w/ Windows 2000 Pro SP4; Intel Pentium Processor w/ Windows 2000 Server SP4; Intel Pentium Processor w/ Windows 2003 Server SP4; Intel Pentium Processor w/ CentOS Linux v.4; UltraSPARC Processor w/ Solaris 9 | 3/27/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Voltage IBE Developers' Toolkit enables any application to utilize Identity Based Encryption (IBE) in combination with common algorithms. Because IBE uses simple strings like email or IP addresses as public keys, it eliminates certificates and associated management. The toolkit includes the core Voltage IBE Cryptographic Module, which is utilized by all Voltage Security applications." |
444 | Snapshield, Ltd. 1 Research Court, Suite 450 Rockville, MD 20850 USA -Victor Elkonin
|
Version 1.00 |
Intel Pentium Processor w/ Windows 2000 | 3/22/2006 |
SHA-1     
(BIT) "Snapshield's total telephony security solutions create transparent safe communication zones, providing organizations with the most effective protection for voice and fax communications. The solution involves connecting encryption terminals: Snapfone for fixed line, Snapcell and Snapsoft for mobile phones and Snaptrunk for ISDN trunks." |
443 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 3.2.116.21 |
IBM 405GP PowerPC w/ IOS 12.3(7)JX3 | 3/14/2006 |
SHA-1     
(BYTE-only) "The Cisco LWAPP Aironet 1131, 1232, 1231, and 1242 access points deliver the versatility, high capacity, security, and enterprise-class features required for small, medium and large Government deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i and IEEE 802.1x standards and Advanced Encryption Standard (AES) for WPA2 encryption. WPA2 is the Wi-Fi Alliance certification for interoperable, standards-based WLAN security. The Cisco APs are also Wi-FI CERTIFIED for IEEE 802.11a, IEEE 802.11b and IEEE 802.11g radio standards." |
442 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 0.9.7i |
Motorola MPC8540 PowerQUICC III w/ Linux Montavista Hardhat 2.4.20 | 3/14/2006 |
SHA-1     
(BYTE-only) "The Cisco 4400 Series Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture. The Cisco WLAN Controllers support voice, video and data services, location & asset tracking, integrated intrusion detection & intrusion protection and intelligent radio resource management and comply with the commercial wireless security policies issued by the U.S. Federal Government and the Department of Defense (DoD)." |
441 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Brian Mansfield
|
Version 2.1 |
Motorola MPC8540 PowerQUICC III w/ Linux Montavista Hardhat 2.4.20 | 3/14/2006 |
SHA-1     
(BYTE-only) "The Cisco 4400 Series Wireless LAN Controllers provide centralized control and scalability for medium to large-scale Government and Enterprise wireless LAN networks and support the IEEE 802.11i wireless security standard in conjunction with meeting the Wi-Fi Alliances interoperability specification WPA2 to enable a Secure Wireless Architecture. The Cisco WLAN Controllers support voice, video and data services, location & asset tracking, integrated intrusion detection & intrusion protection and intelligent radio resource management and comply with the commercial wireless security policies issued by the U.S. Federal Government and the Department of Defense (DoD)." |
440 | UNISYS 2470 Highcrest Road Roseville, Minnesota 55113 USA -Jesse Evans
-Judith Kruse
|
Version 4R5 |
UNISYS 2200 36 bit w/ 2200 IOE 11.0 | 3/8/2006 |
SHA-1     
(BYTE-only) "SSL/TLS included as part of communication software" |
439 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Juan Asenjo
|
Version 1.00 (Firmware) |
IBM PowerPC 405 | 3/8/2006 |
SHA-1     
(BYTE-only) "The Datacryptor® SONET/SDH v1.00 Firmware is present in Datacryptor® SONET/SDH V1.00 cryptographic module. It secures communications using signed Diffie-Hellman key exchange and AES-256 encryption over SONET/SDH networks. It provides data encryption and data rates. It also provides integrated secure unit management capability." |
438 | Utimaco Safeware AG Hohemarkstrasse 22 Oberursel, 61440 Germany -Christian Tobias
-Joachim Schneider
|
Version 4.20 |
Pentium 4 2.8GHz processor w/ Windows 2000 SP4 16 bit OS running; Pentium 4 2.8GHz processor w/ Windows 2000 SP4 32 bit OS running; Pentium 4 2.8GHz processor w/ Windows 2000 Server 16 bit OS running; Pentium 4 2.8GHz processor w/ Windows 2000 Server 32 bit OS running; Pentium 4 2.8GHz processor w/ Windows 2003 SP1 16 bit OS running; Pentium 4 2.8GHz processor w/ Windows 2003 SP1 32 bit OS running; Pentium 4 2.8GHz processor w/ Windows XP Pro SP2 16 bit OS running; Pentium 4 2.8GHz processor w/ Windows XP Pro SP2 32 bit OS running | 3/8/2006 |
SHA-256 
(BYTE-only) "SafeGuard Easy Cryptographic Library is a cryptographic library compiled for 16 bit and 32 bit operating systems that provides symmetric encryption services to the SafeGuard Easy Disk Encryption product." |
437 | JVC KENWOOD Corporation 1-16-2, Hakusan, Midori-ku Yokohama-shi Kanagawa, 226-8525 Japan -Tamaki Shimamura
|
Version 1.0.0 (Firmware) |
Texas Instruments C54x DSP | 3/2/2006 |
SHA-256 
(BIT) "A SHA-256 implementation designed for use in JVC KENWOOD secure communications products" 12/01/11: Updated vendor and implementation information; |
436 | SafeNet Canada, Inc. 20 Colonnade Road, Suite 200 Ottowa, ON K2E 7M6 Canada -Terry Fletcher
|
Version 4.5.2 (Firmware) |
Intel StrongARM II | 2/24/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A hardware security module in PCI form factor that provides a PKCS #11 interface" |
435 | SBI Net Systems Co., Ltd Meguro Tokyu Bldg., 5th Floor 2-13-17 Kamiosaki Shinagawa-ku Tokyo, 141-0021 Japan -Hidemitsu Noguchi
|
Version 1.0.0 |
Pentium 4 w/ Windows XP SP1; Pentium 4 w/ Windows XP SP2; Pentium 4 1.6GHz w/ Windows 2000 SP3 w/Q326886 Hotfix; Power4 w/ IBM AIX 5L (v5.2); PA8500 w/ HP-UX (v11.11); UltraSPARC III+ w/ Solaris 8 | 2/22/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Implementation of SHA-1 and SHA-256 as described in FIPS 180-2." 11/21/07: Update implementation OES; |
434 | WinMagic Inc. 160 Traders Blvd. E., Suite 210 Mississauga, Ontario L4Z 3K7 Canada -Alexandr Mazuruc
-Thi Nguyen-Huu
|
Version 4.5 |
x86 processor w/ Windows 2000 Pro with Service Pack 3; x86 processor w/ Windows XP Pro with Service Pack 2; x86 processor w/ Windows 2000 Advanced Server; x86 processor w/ Windows 2000 Server; x86 processor w/ Windows 2003; x86 Processor w/ Windows Vista | 2/21/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "SecureDoc provides transparent full disk encryption of PC, laptops and PDA as well as removable media, files and folders. It utilizes cryptographic tokens, smartcards and biometric devices for multi-factor pre-boot authentication via PKCS-11 interface." |
433 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Part # SEC 2.0 |
N/A | 2/15/2006 |
SHA-1     
(BYTE-only) Does not support hashing Null messages "The Cisco 1800 Series fixed-configuration models are designed for secure broadband, Metro Ethernet, and wireless connectivity. Businesses can reduce costs by deploying a single device to provide multiple functions, such as DSL broadband access with integrated redundant link, routing, LAN switch, firewall, VPN, IPS, wireless LAN technology, and quality of service (QoS), which are typically performed by separate devices." |
432 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.4(4)T |
Motorola MPC8517F PowerQUICC w/ IOS version 12.4(4)T | 2/15/2006 |
SHA-1     
(BYTE-only) Does not support hashing Null messages "The Cisco 1800 Series fixed-configuration models are designed for secure broadband, Metro Ethernet, and wireless connectivity. Businesses can reduce costs by deploying a single device to provide multiple functions, such as DSL broadband access with integrated redundant link, routing, LAN switch, firewall, VPN, IPS, wireless LAN technology, and quality of service (QoS), which are typically performed by separate devices." |
431 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Howard Moses
|
Version 1.0 |
Pentium Dual Processors running at 2992 Mhz w/ Windows XP Professional with SP 2 installed; AMD Processor running at 1196 Mhz w/ Windows XP with SP 2 installed; AMD Processor running at 1399 Mhz w/ Windows 2000 Professional with SP 4 installed; Pentium Processor running at 930 Mhz w/ Windows 2000 Professional with SP 4 installed; Pentium Processorrunning at 1999 Mhz w/ Windows 2003 Standard Edition; AMD Processor running at 1196 Mhz w/ Windows 2003 Standard Edition | 2/15/2006 |
SHA-1     
(BYTE-only) "A software implementation providing the SHS algorithm for use in McAfee VirusScan Enterprise" |
430 | Tricipher, Inc. 1900 Alameda de las Pulgas, Suite 112 San Mateo, CA 94403 USA -Tim Renshaw
|
Version 1.0 (Firmware) |
Intel (R) Xeon(R) 2.8GHz CPU w/ Linux Free BSD 5.3 on the TACS 1000 and 2000 | 2/17/2006 |
SHA-1     
(BYTE-only) "TriCipher Armored Credential System (TM) (TACS) algorithms" |
429 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Nancy Canty
|
Version 1.0 (Firmware) |
IBM 440GX CPU @ 667 MHz | 2/15/2006 |
SHA-256 
(BYTE-only) "Cryptographic algorithms implemented in BorderGuard DPF1 firmware." |
428 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Chris Romeo
|
Version 12.3(8)JA |
IBM PowerPC 405 w/ IOS 12.3(8)JA | 2/15/2006 |
SHA-1     
(BYTE-only) "The Cisco Aironet 1131AG, 1242AG, 1232AG, and 1310G access points deliver the versatility, high capacity, security, and enterprise-class features required for autonomous based Government deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11i standard and Advanced Encryption Standard (AES). The Cisco APs are Wi-FI CERTIFIED for IEEE 802.11a, IEEE 802.11b and IEEE 802.11g radio standards." |
427 | Gemplus Avenue du Pic de Bertagne GEMENOS Cedex, BP100 13881 FRANCE -Thierry Deffontaines
|
Version GCX4 - FIPS IE07 (Firmaware) |
Proprietary | 1/30/2006 |
SHA-1     
(BYTE-only) "This implementation is dedicated to provide the crypto algorithm on the GemCombiXpresso R4 Java card product through the Java Card API. It provides Random Number generation, 3DES and RSA up to 2048 bits key length as well as X9.31 RSA On Board Key generation up to 2048 bits long." |
426 | Red Hat, Inc. and Sun Microsystems, Inc. See the vendor web site -Glen Beasley
-Wan-Teh Chang
|
Version 3.11 |
PA-RISC platform w/ HP-UX B.11.11; AMD64 platform w/ 64-bit Solaris 10; SPARC platform w/64-bit Trusted Solaris 8; x86 platform w/ Red Hat Enterprise Linux 3; x86 platform w/ Red Hat Enterprise Linux 4; x86 platform w/ Windows XP; PowerPC G4 platform w/ Mac OS X 10.4; x86-64 platform w/ Red Hat Enterprise Linux 4 | 1/30/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major crypto algorithms and Internet security standards, and supports smartcards and hardware crypto devices. NSS is available free of charge under the Mozilla Public License, the GNU General Public License, and the GNU Lesser General Public License. For more information, see http://www.mozilla.org/projects/security/pki/nss/" 10/17/06: Update new OS/Processor; |
425 | Inter-4, a Division of Sierra Nevada Corporation 1777 Montgomery St. San Francisco, CA 94111 USA -Paul Matz
-Dan Haddick
|
Version 1.0 |
Intel XScale PXA255 w/ Windows CE 4.2; Intel Pentium M 1.6GHz w/ Windows XP Pro SP2; Intel Pentium M 1.6GHz w/ Embedded Windows XP Pro SP2; Intel XScale PXA255 w/ Linux 2.6; Intel Pentium M 1.6GHz w/ Linux 2.6 (Fedora Core 2) | 1/19/2006 |
SHA-1     
(BYTE-only) "Implementation of SHA-1 to provide cryptographic services for other Inter-4 and Sierra Nevada Corporation products and services." 09/03/08: Update OES'; |
424 | Algorithmic Research Ltd. 10 Nevatim Street Kiryat Matalon Petach Tikva, 49561 Israel -Ezer Farhi
|
Version 4.0 (Hardware) |
N/A | 1/19/2006 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host." |
423 | MRV Communications 295 Foster St. Littleton, MA 01460 USA |
Version 3.6.2 (Firmware) |
Freescale PQ1 MPC885 embedded RISC Processor | 1/19/2006 |
SHA-1     
(BYTE-only) "In-Reach is a complete Remote Presence solution that allows customers to proactively respond to all remote control, configuration and data acquisition needs as if they were physically there. By extending serial and console port access and facilitating alarm and power management capabilities over IP networks, In-Reach gives you visibility and control from virtually anywhere. Unlike any other general terminal server or console management solution, In-Reach is optimized to provide a secure and converged Remote Presence solution, offering serial connectivity, console, power and alarm management capabilities, all in a single box." |
422 | Broadcom Corporation 16215 Alton Parkway Irvine, CA 92618 USA -Steve Goodell
|
Part # BCM5841 |
N/A | 1/19/2006 |
SHA-1     
(BYTE-only) "The BCM5841 coprocessor is a multi-gigabit, high performance cryptographic coprocessor specifically designed for IPSec VPN applications." |
421 | Thales Communications, Inc. 22605 Gateway Center Drive Clarksburg, MD 20871 USA -Dave Miller
|
Version 8.0 |
Pentium 4,2.4Ghz w/ Windows XP Professional SP2 | 1/11/2006 |
SHA-1     
(BYTE-only) "Algorithms for encryption, hashing, and message digest functions." |
420 | TecSec, Incorporated 1953 Gallows Road, Suite 220 Vienna, VA 22182 USA -Roger Butler
|
Version 1.0 |
Pentium III 933 MHz w/ Windows XP | 1/11/2006 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The CKM Algorithms is a library that provides FIPS Approved algorithms for use in the CKM Cryptographic Module." |
419 | Phoenix Technologies Ltd. 915 Murphy Ranch Road Milpitas, CA 95035 USA -Shiva Mandalam
|
Version 4.0 |
Intel Pentium 4 w/ Windows XP | 1/11/2006 |
SHA-1     
(BYTE-only) "Phoenix TrustConnector is a standard cryptographic service provider that enables built-in device authentication and transparently enhances the way Windows protects identity credentials associated with digital certificates and binds the credentials to the platform to which they are issued." |
418 | Phoenix Technologies Ltd. 915 Murphy Ranch Road Milpitas, CA 95035 USA -Shiva Mandalam
|
Version 3.1 (Firmware) |
Intel Pentium 4 | 1/11/2006 |
SHA-1     
(BYTE-only) "Phoenix TrustedCore StrongROM firmware cryptographic engine enables built-in device authentication and identification." |
417 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2120 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2120 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
416 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2240 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2240 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
415 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2250 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2250 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
414 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2260 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2260 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
413 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2340 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2340 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
412 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2350 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2350 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
411 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2430 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2430 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
410 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2450 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2450 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
409 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Rajneesh Gaur
|
Part # CN2460 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "The NITROX II CN2460 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
408 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Mike Scruggs
|
Part # Nitrox die, v2.0 |
N/A | 1/3/2006 |
SHA-1     
(BYTE-only) "NITROX II is a series of multi-core, inline hardware macro processors, using a common processor core architecture. Each identical NITROX II core implements several security and math algorithms, including ModEx, RSA, 3DES, AES256, SHA1, MD5, and HMAC. NITROX II series part numbers include CN2120, CN2130, CN2240, CN2250, CN2260, CN2340, CN2350, CN2360, CN2420, CN2430, CN2435, CN2450, CN2460, and CN2560. Family performance ranges from 1 to 10 Gbps of encryption bandwidth, and 5K to 40K RSA/DH operations per second. NITROX II processors and acceleration boards are used in a wide range of equipment, and accelerate many security protocols and algorithms including IPSec and SSL." 05/27/08: Update vendor and implementation information; |
407 | D'Crypt Private Limited 20 Ayer Rajah Crescent #08-08 Technopreneur Centre Singapore, 139964 SINGAPORE -Chew Hwee Boon
-Quek Gim Chye
|
Version 1.0 (Firmware) |
Proprietary Hardware | 1/19/2006 |
SHA-1     
(BYTE-only) "d'Cryptor ZE is a micro-token targeted at high security embedded applications. Central to the next generation d'Cryptor products where it serves as a secure coprocessor, the ZE provides cryptographic/key management services, secure key storage and supports interfaces like UARTs, SSP, infrared, contact/contactless" |
406 | AirMagnet, Inc. 1325 Chesapeake Terrace Sunnyvale, CA 94089 USA -Tony Ho
|
Version 7.0 (Firmware) |
Intel xScale 425 processor; IDT Interprise Integrated Communications Processor 79RC32K438 | 12/21/2005 |
SHA-1     
(BYTE-only) "The SmartEdge Sensor is equipped with patent pending AirWISE Analytical Engine that, in real time, monitors and analyzes the security, performance, and reliability of the wireless network." |
405 | T000 |
Version 7.1.2020 (Firmware) |
TMS320C5510 | 12/21/2005 |
SHA-256 
(BYTE-only) "VHF packet transceiver with encryption and TRANSEC capability" |
404 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.3(11)T10 |
Broadcom BCM SiByte 1250 w/ OS version 12.3(11)T10 | 12/21/2005 |
SHA-1     
(BYTE-only) "Cisco 7206 VXR routers accommodate a variety of network interface port adapters and an Input/Output (I/O) controller. A Cisco 7206 VXR router equipped with an NPE-G1 can support up to six high-speed port adapters and can also support higher-speed port adapter interfaces including Gigabit Ethernet and OC-12 ATM (Optical Carrier-12 Asynchronous Transfer Mode)." |
403 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Joel Rieger
|
Version 1.0 |
Pentium III 450 MHz w/ Red Hat Linux Kernel 2.4.18-3; Solaris 8.2/02; 1.2 GHz 64-bit UltraSPARC III Cu CPU | 12/21/2005 |
SHA-1     
(BYTE-only) "The CGX SHA-1 v1.0 is incorporated in the CGX Cryptographic Module version 3.21.1." |
402 | Mocana Corporation 101 Jefferson Dr. Menlo Park, CA 94025 USA -James Blaisdell
|
Version 1.36 |
Intel Pentium M 1.86 GHz w/ Windows XP Home Edition | 12/8/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Part of the Mocana Cryptographic Module that is used in conjunction with Mocana's scalable, high performance and small footprint embedded security solutions. These include Mocana SSL/TLS Server and Client, Mocana SSH Server and Client and Mocana IPSec/IKE. Free evaluation available at www.mocana.com/evaluate.html" |
401 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 7814-W |
N/A | 11/28/2005 |
SHA-1     
(BYTE-only) "Hifn Intelligent Packet Processing chips are full-duplex T3 to full-duplex OC-12, Integrated public key, 3DES, Advanced Encryption Standard (AES), and compression - the latest chips from Hifn have it all in a single high-performance package." |
400 | Francotyp-Postalia GmbH Triftweg 21-26 Birkenwerder, 16547 Germany -Hasbi Kabacaoglu
|
Version 90.0036.0006.00/03 (Firmware) |
Samsung S3C44B0 X w/ Express Logic's ThreadX | 11/16/2005 |
SHA-1     
(BYTE-only) "The Postal Revenector is an embedded hardware module which provides security-critical services for the Information Based Indicia Program (IBIP) of the United States Postal Service (USPS). It is used to support new secure methods of applying postage." |
399 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.4(2)T |
Motorola MPC8272 PowerQUICC w/ IOS version 12.4(2)T | 11/16/2005 |
SHA-1     
(BYTE-only) Does not support hashing of zero length messages. "The new Cisco 800 Series routers extend concurrent data, security, and wireless to enterprise branch offices, teleworkers, and small businesses to help increase productivity and streamline operations. The Cisco 870 series allow small offices to operate secure concurrent services, including firewall, VPNs, and wireless LANs, at broadband speeds." |
398 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Part # SEC 1.0 |
N/A | 11/16/2005 |
SHA-1     
(BYTE-only) Does not support hashing of zero length messages. "The new Cisco 800 Series routers extend concurrent data, security, and wireless to enterprise branch offices, teleworkers, and small businesses to help increase productivity and streamline operations. The Cisco 870 series allow small offices to operate secure concurrent services, including firewall, VPNs, and wireless LANs, at broadband speeds." |
397 | NetLogic Microsystems 18920 Forge Drive Cupertino, CA 95014 USA -Mark Litvack
|
Part # XLR 732, Version A0 |
N/A | 11/14/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "RMI’s XLR™ Thread Processors™ offer highthroughput general purpose processing with intelligent system and functional integration. RMI XLR processors combine the power of innovative multiprocessing and multithreaded architecture with the simplicity of a leading edge, general purpose MIPS64® machine enabling wire speed, software-driven applications across multiple platforms." |
396 | Intel Corporation 77 Reed Road Hudson, MA 01749 USA -Joshua Hort
|
Version IXP2850 B1 Part # RPIXP2850BB |
N/A | 11/10/2005 |
SHA-1     
(BYTE-only) "Cryptographic Cores of the Intel® IXP2850 Network Processor are high performance hardware cores which implement DES, Triple-DES, AES, SHA-1 and HMAC. The hardware unit is interfaced via cryptographic APIs running on internal Microengines which are loaded and controlled via an integrated Intel® XScale (TM) core." |
395 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version AAA (Firmware) Part # 1M00 USA, 1M20 UK |
Gatekeeper 3 (GK3) ASIC | 11/4/2005 |
SHA-1     
(BYTE-only) "The Pitney Bowes Cygnus X-2 Postal Security Device (PSD) has been designed in compliance with FIPS 140-2 and IPMAR security protection profile in order to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong encryption, decryption, and digital signature techniques for the protection of customer funds in Pitney Bowes Postage Metering products." |
394 | Zix Corporation 2711 North Haskill Ave., Suite 2200 Dallas, TX 75204-2960 USA -John Falsetto
-Christina Venne
|
Version 1.02 |
2x Intel Pentium 4 XEON 2.0Ghz Processors (x86) with Linux RedHat Enterprise 3 | 11/4/2005 |
SHA-1     
(BYTE-only) "The S/MIME Gateway Cryptographic Module is a software library that contains FIPS-approved cryptographic algorithms. The module can provide a variety of cryptographic services for selected ZixCorp products such as symmetric and asymmetric encryption, hash, digital signing and verification, and decryption." |
393 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Chris Romeo
|
Version 7.0.4 |
Intel Pentium w/ Adaptive Security Appliance OS 7.0.4; Intel Celeron w/ Adaptive Security Appliance OS 7.0.4;Intel Pentium IV w/ Adaptive Security Appliance OS 7.0.4; Intel Pentium III Xeon w/ Adaptive Security Appliance OS 7.0.4 | 11/2/2005 |
SHA-1     
(BYTE-only) "The market-leading Cisco PIX and ASA Security Appliance Series deliver robust user and application policy enforcement, and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco PIX Security Appliances and ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes." |
392 | Neopost Industrie 113 Rue Jean Marin Naudin Bagneux, 92220 France -Gary Steward
|
Version 4130171L_G00 (Firmware) |
SH1 microcontroller (Hitachi) | 11/2/2005 |
SHA-1     
(BYTE-only) "The IJ25 is a Neopost low range franking product that incorporates a secure metering module for producing highly secure franking impressions to meet CPC requirements." |
391 | Neopost Industrie 113 Rue Jean Marin Naudin Bagneux, 92220 France -Gary Steward
|
Version 30.19 (Firmware) |
Pentium 4 | 11/2/2005 |
SHA-1     
(BYTE-only) "The C20ND module is a postage meter supporting accounting and cryptographic functions including the generation of 2D barcodes with ECDSA signatures for secure electronic transactions. Associated with a document transport system and an inkjet print-head, the module is capable of processing up to 250 envelopes per" 4/13/06: FR30 FUJITSU microcontroller; |
390 | CyberGuard Corporation 350 SW 12th Ave Deerfield Beach, FL 33442 USA -Soheila Amiri
|
Version 6.2.2 (Firmware) |
Intel P4 3.0GHz; Intel Xeon 3.06GHz; (4)AMD 848 2.2GHz | 11/2/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The firmware-based CyberGuard TSP Cryptographic Module, designed for FIPS 140-2 compliance, supports the following cryptographic algorithms: AES, DES, 3DES, SHA-1, SHA-256, HMAC-SHA1, HMAC-SHA-256 and RNG-ANSIx962. This TSP Cryptographic Module is included with all of the CyberGuard TSP Family line of Firewall/VPN products." |
389 | Neopost Industrie 113 Rue Jean Marin Naudin Bagneux, 92220 France -Gary Steward
|
Version 4126898B A (Firmware) |
SH2 microcontroller (Hitachi) | 10/18/2005 |
SHA-1     
(BYTE-only) "The IJ40/50 are Neopost mid range franking products that incorporate the FIPS Approved secure metering module for producing highly secure franking impressions to meet CPC requirements." |
388 | Surety LLC 12950 Worldgate Drive Herndon, VA 20170 USA -Surety Product Management
|
Version 5.1 |
Intel Pentium 4 w/ Windows XP | 10/18/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Surety Cryptographic Library (Java) implements cryptographic functions for the Surety AbsoluteProof(SM) line of data integrity products." |
387 | Surety LLC 12950 Worldgate Drive Herndon, VA 20170 USA -Surety Product Management
|
Version 5.1 |
Intel Pentium III w/ Red Hat Enterprise Linux; Intel Pentium 4 w/ Windows XP; Ultra SPARC III w/ Sun Solaris 9; Intel Xeon w/ Windows 2003 | 10/18/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Surety Cryptographic Library (C++) implements cryptographic functions for the Surety AbsoluteProof(SM) line of data integrity products." |
386 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Kenneth Jensen
|
Version 2.4 |
Motorola PowerPC 8241 w/ ArubaOS 2.4 | 9/23/2005 |
SHA-1     
(BYTE-only) "Aruba Wireless Networks’ WLAN switching platform is a purpose-built WLAN voice and data switching solution designed to specifically address the needs and reduce the cost of large scale Wi-Fi network deployments for Government agencies and large enterprise. The Aruba Wireless Networks WLAN switching platform is a highly scalable and redundant solution that provides centralized intelligence to secure and manage the corporate RF environment, enforce identity based user security policies, enable service creation and provide secure mobility management to thousands of simultaneously connected users." |
385 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Mike Lai
|
Version 5.2.3790.1830 |
AMD Opteron 246, x64 w/ Windows Server 2003 SP1 (x64); Intel Celeron, x86 w/ Windows Server 2003, SP1 (x86); Intel Itanium, ia64 w/ Windows Server 2003 SP1 (ia64) | 9/20/2005 |
SHA-1     
(BYTE-only) "The Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based, cryptographic module. DSSENH encapsulates several different cryptographic algorithms (including SHA-1, DES, 3DES, DSA) in a cryptographic module accessible via the Microsoft CryptoAPI." |
384 | Global Key Tek 218 Randolph Avenue Huntsville, AL 35806 USA -Ronn Cochran
|
Version 3.4.1 |
Intel Celeron w/ Windows XP | 9/20/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Encryptis Crpytographic Library" |
383 | Tutarus Corporation P.O. Box 38 Madison, AL 35878 USA -Ray C. Clayton
-Eli J. Mendoza
|
Version 1.0 |
Intel Celeron w/ Windows XP | 9/20/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "TRAKRON Crpytographic Library" |
382 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 4.1 (Firmware) |
32-bit ARM7 Processor | 9/9/2005 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry Cryptographic API is the firmware module that provides advanced cryptographic functionality to BlackBerry Wireless Handhelds." |
381 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.5.3 |
Sony Notebook Computer PCG-8C6L w/ Windows XP Professional 2002 SP-2; Apple PowerBook G4 w/ Mac OS X 10.4.2 (8C46) | 8/31/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." 05/11/07: Update vendor POC information; |
380 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 2.0 |
Intel PXA255 w/ PocketPC 2003; Intel Celeron w/ Microsoft Windows XP SP2; Motorola MPC 7455 w/ VxWorks 5.4, PowerPC 604; Motorola MPC 8260 w/ VxWorks 5.5, PowerPC 603; Motorola MPC 7455 w/VxWorks 5.5, PowerPC 604; SPARC IIe w/ Sun Microsystems Solaris 8 (Sun OS 5.8) Sparc V9; SPARC IIe w/ Sun Microsystems Solaris 8 (Sun OS 5.8) Sparc V8+; SPARC IIe w/ Sun Microsystems Solaris 8 (Sun OS 5.8) SPARC V8; Intel Pentium 4 w/ Red Hat Linux 7.2; AMD Athlon 800 w/ Red Hat Enterprise Linux AS 3.0; Intel Itanium 2 w/ HP-UX 11.23 Itanium2, 64-bit; IBM Power5 (2-way) w/ AIX 5L v5.x, 32-bit; PA-RISC PA8500 2.0 w/ HP-UX 11.11; PA-RISC PA8500 2.0W w/ HP-UX 11.23 | 8/26/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto-C Micro Edition (ME) Module is RSA Security, Inc.'s cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors while offering great flexibility and choice by allowing developers to select only the algorithms needed in reduced code sizes. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more." |
379 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Venkatesh Sundar
-Bruce McHaffie
|
Version 8.0 |
x86 Intel Processor w/ Windows 2000; x86 Intel Processor w/ Windows XP | 8/23/2005 |
SHA-1     
(BYTE-only) "The Entrust LightWeight Java Cryptographic Toolkit performs low level cryptographic operations - encryption, decryption and hashes - implemented in software using the high-level Java programming language. Currently, the module is imbedded into an applet as part of the TruePass product suite that allows integration of cryptographic security into web applications." |
378 | AirMagnet, Inc. 1325 Chesapeake Terrace Sunnyvale, CA 94089 USA -Tony Ho
|
Part # 6.1 |
Intel xScale 425 processor | 8/16/2005 |
SHA-1     
(BYTE-only) "The SmartEdge Sensor is equipped with patent pending AirWISE Analytical Engine that, in real time, monitors and analyzes the security, performance, and reliability of the wireless network." |
377 | SecureLogix Corporation 13750 San Pedro, Suite 230 San Antonio, TX 78232 USA -Timothy J. Barton
|
Version 5.0.1 |
Pentium IV 2.53 GHz w/ Windows 2003 | 8/31/2005 |
SHA-1     
(BYTE-only) "The ETM System is a PBX/soft switch-independent, easy-to-use platform that supports security and management applications for real-time visibility, security, and control of telecommunications resources across the enterprise. The ETM System's C Language Applications Dynamic Link Library provides Triple DES encryption routines for Windows-based ETM Applications, such as the ETM Collection Server. The C Language DLL is used to secure network communications between the ETM Collection Server and ETM Call Recorder Cache Appliances." |
376 | SecureLogix Corporation 13750 San Pedro, Suite 230 San Antonio, TX 78232 USA -Timothy J. Barton
|
Version 5.0.1 |
Pentium IV 2.19 GHz w/ Windows 2003 | 8/31/2005 |
SHA-1     
(BYTE-only) "The ETM System is a PBX/soft switch-independent, easy-to-use platform that supports security and management applications for real-time visibility, security, and control of telecommunications resources across the enterprise. Some of the key components of the ETM System are: the Management Server, Report Server, Performance Manager, and Usage Manager. These components are written in the Java programming language and are typically used in a distributed architecture across an enterprise LAN or WAN. These components utilize a common library of Triple DES encryption routines to secure their network communications." |
375 | SecureLogix Corporation 13750 San Pedro, Suite 230 San Antonio, TX 78232 USA -Timothy J. Barton
|
Version 5.0.1 (Firmware) |
Motorola MPC8245 | 8/16/2005 |
SHA-1     
(BYTE-only) "The ETM System is a PBX/soft switch-independent, easy-to-use platform that supports security and management applications for real-time visibility, security, and control of telecommunications resources across the enterprise. Primary components of the ETM System are the ETM Appliances, custom designed devices installed inline on the telecommunication circuits to monitor and control VoIP, PRI, CAS, SS7, and analog voice traffic. The system uses a C library of TDES encryption routines to secure their network communications." |
374 | SPYRUS, Inc. 2355 Oakland Road, Suite 1 San Jose, CA 95131 USA -Tom Dickens
|
Version 2.2 (Firmware) |
ARM7-TDMI Processor | 8/16/2005 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The LYNKS Series II Hardware Security Module (HSM) supports the new "Suite B" algorithms, including elliptic curve cryptography with ECDSA signatures, AES, and the "SHA-2" algorithms. Available with either PCMCIA or USB interfaces." |
373 | SPYRUS, Inc. 2355 Oakland Road, Suite 1 San Jose, CA 95131 USA -Tom Dickens
|
Version 2.2 (Firmware) |
ARM7-TDMI Processor | 8/16/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The LYNKS Series II Hardware Security Module (HSM) supports the new "Suite B" algorithms, including elliptic curve cryptography with ECDSA signatures, AES, and the "SHA-2" algoirthms. Avaialble with either PCMCIA or USB interfaces. The LYNKS Series II HSMs are ideal for use as Certificate Authority HSMs." |
372 | D'Crypt Private Limited 20 Ayer Rajah Crescent #08-08 Technopreneur Centre Singapore, 139964 SINGAPORE -Quek Gim Chye
|
Version Kernel v3.0 (builds 1124783674, 1124783679) (Firmware) Part # DC-ZEN4-30 v3.0, DC-ZEN2-30 v3.0 |
d'Cryptor ZE Cryptographic Kernel | 8/16/2005 |
SHA-1     
(BYTE-only) "d'Cryptor ZE is a micro-token targeted at high security embedded applications. Central to the next generation d'Cryptor products, the ZE provides cryptographic/key management services, secure key storage and supports interfaces such as UARTs, SSP, infrared, contact/contactless Smartcard and GPIOs." |
371 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Mike Lai
|
Version 5.2.3790.1830 |
AMD Opteron 246, 2 GHz, x64 w/ Windows Server 2003 Service Pack 1 (x64); Intel Celeron, 2.53 Ghz, x86 w/ Windows Server 2003 Service Pack 1 (x86); Intel Itanium ia64 w/ Windows Server 2003 Service Pack 1 (ia64) | 8/11/2005 |
SHA-1     
(BYTE-only) "Microsoft Corporation’s Windows Server 2003 Kernel Mode Cryptographic Module (FIPS.SYS), designed for FIPS 140-2 compliance, is a general-purpose, software-based, cryptographic module residing at the Kernel Mode level of the Windows Operating System. It runs as a kernel mode export driver (a kernel-mode DLL) and encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible by other kernel mode drivers. It can be linked into other kernel mode services to permit the use of FIPS 140-2 Level 1 compliant cryptography." |
370 | SBI Net Systems Co., Ltd Meguro Tokyu Bldg., 5th Floor 2-13-17 Kamiosaki Shinagawa-ku Tokyo, 141-0021 Japan -Hidemitsu Noguchi
|
Version 2.0.0 |
PowerPC 604E w/ IBM AIX 5L (v5.2); A5522A w/ HPUX (11i)(v11.11); Pentium M w/ Windows 2000 SP3; SPARC 2 w/ Solaris 8 | 8/11/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "C4CS Lite is a cryptographic library, which provides a variety of cryptographic services, both FIPS Approved/NIST recommended and non-Approved, such as symmetric/asymmetric ciphers, hash functions, and secret sharing schemes. The software module can support a wide range of operating systems, such as Windows, Linux, Solaris, HP-UX, AIX, and others." 08/28/08: Update vendor information; |
369 | Futurex 864 Old Boerne Road Bulverde, TX 78163 USA -Jason Anderson
|
Version 2.4 (Firmware) |
PowerPC 405 | 8/11/2005 |
SHA-1     
(BYTE-only) "Financial PIN Transaction processing using the cryptographic library OpenSSL." |
368 | Secure Computing Corporation 2340 Energy Park Drive St. Paul, MN 55108 USA -Chuck Monroe
|
Version 1.0 |
x86 processor w/ SecureOS® 6.1 | 8/11/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Cryptographic Library for SecureOS® is a software library providing services for the cryptographic module operating on versions of the Sidewinder G2® Security Appliance™ and Sidewinder G2 Enterprise Manager™." |
367 | Authenex 1489 Salmon Way Hayward, CA 94544 USA -Nancy Mao
|
Version 3.6.0.1 (Firmware) |
Intel P4 2.66 GHz | 8/11/2005 |
SHA-1     
(BYTE-only) SHS does not support long messages equal to or greater than 1304 bits. "The implementation follows FIPS PUB 180-2 standard. The length of message digest is 160 bits." |
366 | Nortel 600 Technology Park Billerica, MA 01821 USA -Jonathan Lewis
-David Passamonte
|
Version 5.05 |
Proprietary processor and operating system | 8/3/2005 |
SHA-1     
(BYTE-only) "Contivity Secure IP Services Gateways provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity for secure connectivity across managed IP networks and the Internet. Contivity Secure IP Services Gateways connect remote users, branch offices, suppliers, and customers with the cost and performance advantages of public IP networks and the security and control found in private networks." |
365 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 3.8.3 (Firmware) |
32-bit ARM7 Processor | 8/3/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry is totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry Cryptographic Kernel is the firmware module that provides the core cryptographic functionality to BlackBerry Wireless Handhelds." |
364 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Mike Lai
|
Version 5.2.3790.1830 |
AMD Opteron 246, 2 GHz, x64 w/ Windows Server 2003 Service Pack 1 (x64); Intel Celeron, 2.53 Ghz, x86 w/ Windows Server 2003 Service Pack 1 (x86); Intel Itanium, 733 MHz, ia64 w/ Windows Server 2003 Service Pack 1 (ia64) | 7/21/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Microsoft Enhanced Cryptographic Provider, designed for FIPS 140-2 compliance, is a software-based, cryptographic module. RSAENH encapsulates several different cryptographic algorithms (including SHA-1, DES, 3DES, AES, RSA, SHA-1-based HMAC) in a cryptographic module accessible via the Microsoft CryptoAPI." |
363 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 3.0 |
Intel Pentium 4 Processor w/ Windows 2000 Service Pack 4 | 7/20/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry Enterprise Server Cryptographic Kernel is the software module that provides the core cryptographic functionality to the BlackBerry Enterprise Server." |
362 | Arcot Systems, Inc. 455 West Maude Ave. Sunnyvale, CA 94085 USA -Rob Jerdonek
|
Version 1.7.3 |
Pentium III w/ Windows 2000 | 7/15/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The Arcot Core Security Module provides the core cryptographic functionality for Arcot's WebFort, TransFort, TrustFort, RegFort, and Arcot Universal Client products." 10/17/05 - SHA256 Byte oriented validated with CAVS Version 4.6 |
361 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.3(14)T2 |
Motorola MPC 8250 PowerQUICC II w/ IOS 12.3(14)T2 | 7/15/2005 |
SHA-1     
(BYTE-only) "The Cisco 3200 Mobile Access Router offers secure data, voice, and video communications with seamless mobility across wireless networks independent of location or movement. This access router has a high-performance, compact, rugged design optimized for use in vehicles in the defense, public safety, Homeland Security and transportation markets." |
360 | Open Source Software Institute Administrative Office P.O. Box 547 Oxford, MS 38655 USA -Ben Laurie
-John Weathersby
|
Version 1.0 |
HP D Class 9000 w/ HP-UX Release B.11.11; Linux Kernel Version: 2.4.21 w/ SuSE Linux 9.0 (x86) | 7/15/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website." |
359 | Ian Donnelly Systems, Inc. 17752 Preston Road Dallas, TX 75252 USA -Ian Donnelly
-Craig Mixon
|
Part # KEY-UP III Version 5 |
N/A | 6/24/2005 |
SHA-1     
(BYTE-only) "KEY-UP Version 5 security module is a hardware/software solution. It is designed to help protect sensitive data in an Electronic Funds Transfer (EFT) environment. It supports 3DES industry standard encryption algorithms." |
358 | Mindspeed Technologies, Inc. 4000 Mac Arthur Blvd., East Tower Newport Beach, CA 92660 USA -Norbert Rossello
|
Version Comcerto (Firmware) Part # M82nxx |
RTXC; ARM | 6/22/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Mindspeed Comcerto family of secure voice-over packet (VoP) processors includes complete solutions for enterprise and carrier networks. The Comcerto provides encryption and authentication thanks to a user-friendly API. The Comcerto encryption algorithms are also NIST validated as AES, 3DES, and DES. In addition to encryption and authentication, Comcerto also delivers protocols for media security." |
357 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Taiwan, ROC -Yeo-Fuh Kuan
-Char-Shin Miou
|
Version 3.0 (Firmware) |
Java Card Runtime Environment Version 2.2.1 w/ Open Platform 2.0.1 | 6/10/2005 |
SHA-1     
(BYTE-only) "The HICOS PKI Smart Card Library is a set of cryptographic functions that perform Encryption/Decryption, Key Generation, and Signature operations for the HICOS PKI Smart Card" |
356 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 3.5 |
Intel Pentium IV 2.6 GHz w/ Microsoft Windows XP SP2 | 6/8/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. RSA BSAFE Crypto-J supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." |
355 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 3.5 |
Intel Pentium IV (x86), 2.6 GHz w/ Microsoft Windows XP SP2 | 6/8/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "RSA BSAFE® Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. RSA BSAFE Crypto-J supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." |
354 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Eric Crump
|
Version 1.3.0 (Firmware) |
QED RM5231A processor | 6/3/2005 |
SHA-1     
(BYTE-only) Does not hash Null message. "Lexmark W820 Cryptographic Platform provides the cryptographic solution for the W820 printer's secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
353 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Eric Crump
|
Version 1.3.0 (Firmware) |
PMC RM7000C MIPS processor | 6/3/2005 |
SHA-1     
(BYTE-only) Does not hash Null message. "Lexmark C912 Cryptographic Platform provides the cryptographic solution for the C912 printer's secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
352 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Eric Crump
|
Version 1.3.0 (Firmware) |
PMC RM7065C MIPS processor | 6/3/2005 |
SHA-1     
(BYTE-only) Does not hash Null message. "Lexmark C760/2 Cryptographic Platform provides the cryptographic solution for the C760 and C762 printers secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
351 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA -Eric Crump
|
Version 1.3.0 (Firmware) |
PMC RM7065C MIPS processor | 6/3/2005 |
SHA-1     
(BYTE-only) Does not hash Null message. "Lexmark T634 Cryptographic Platform provides the cryptographic solution for the T634 printer's secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
350 | Lexmark International, Inc. 740 West New Circle Road Lexington, KY 40550 USA - Eric Crump
|
Version 1.3.0 (Firmware) |
PMC RM5231A MIPS processor | 6/3/2005 |
SHA-1     
(BYTE-only) Does not hash Null message. "Lexmark T630/2 Cryptographic Platform provides the cryptographic solution for the T630 and T632 printers secure printing capabilities. The implementation offers secure print jobs using the Advanced Encryption Standard (FIPS 197) algorithm and RSA key wrapping." |
349 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Christopher Marks
|
Version JPR2 (Firmware) |
Proprietary hardware platform | 5/16/2005 |
SHA-1     
(BYTE-only) "The Juniper Networks ISG-2000 is a purpose-built internet security appliance that provides advanced firewall, IPSec VPN, and traffic management functionality, optimized for the most demanding environments such as medium and large enterprise offices, carrier infrastructures, or service providers." |
348 | Mobile Armor, LLC 400 South Woods Mill Road, Suite 110 Chesterfield, MO 63017-3407 USA -Bryan Glancey
-Chand Vyas
|
Version 2.1 |
Intel Celeron, 2.53GHz w/ RedHat Linux Enterprise Server 3.0; Intel PXA250 400MHz w/ Pocket PC 2003; Intel Celeron, 2.53GHz w/ Windows XP SP 2 | 5/10/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Mobile Armor’s Cross platform implementation of Cryptographic Services for use in Enterprise Mobile Data Security products on the Linux, Windows XP, and Windows CE platform." |
347 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
|
Version JUNOS_72_BP (Firmware) |
AS2 network processor | 5/16/2005 |
SHA-1     
(BYTE-only) "Encryption module AS2-FIPS for use with M&T router" |
346 | Mobile Armor, LLC 400 South Woods Mill Road, Suite 110 Chesterfield, MO 63017-3407 USA -Bryan Glancey
-Chand Vyas
|
Version 2.1 |
Intel Celeron, 2.53GHz w/ Windows XP Service Pack 2 | 5/10/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "Mobile Armor's highly optimized Microsoft Windows Certified Driver for Windows XP provides reliable high speed strong cryptographic services for systems running Mobile Armor's DataArmor Enterprise Mobile Data Protection software." |
345 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 8155, HW version: 1.0 |
N/A | 5/4/2005 |
SHA-1     
(BYTE-only) "The HIPP 8155 (8155PP5/8155PP5-G) security processors are highly-integrated cryptographic processors capable of performing DES, 3DES, ARC4, AES (128, 192, 256 bit), MD5, SHA-1 and HMAC at speeds up to full-duplex OC-12. The 8155’s on-board DPU processes protocols based on the available hardware algorithms. This currently includes IPv4/IPv6, IPsec, SSL, IPPCP and PPTP." |
344 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 2.2.0 (Firmware) Part # MV96340 Rev.A1 |
N/A | 5/4/2005 |
SHA-1     
(BYTE-only) "The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speeds up to multiple T1/E1/xDSL connections. The Cisco 2800 Series routers offer embedded encryption acceleration on the motherboard. By integrating security functions directly into the router itself, Cisco can provide unique intelligent security solutions, such as network admissions control (NAC) for antivirus defense; Voice and Video Enabled VPN (V3PN) for quality-of-service (QoS) enforcement when combining voice, video, and VPN; and Dynamic Multipoint VPN (DMVPN) and Easy VPN for enabling more scalable and manageable VPN networks." |
343 | Britestream Networks, Inc 12401 Research Blvd. Bldg 2, Suite 275 Austin, TX 78759 -Rick Hall
-Tom Black
|
Version 1.0 (Firmware) |
BN1250 | 5/10/2005 |
SHA-1     
(BYTE-only) "The Britestream Key Management Module performs various tasks associated with cryptographic key management including key generation, key wrapping, secure key storage and secure key transport as well as key zeroization. These functions comply with requirements for achieving FIPS 140-2 certification of the overall system that the module is used in." |
342 | Britestream Networks, Inc 12401 Research Blvd. Bldg 2, Suite 275 Austin, TX 78759 -Rick Hall
-Tom Black
|
Part # A4 |
N/A | 5/4/2005 |
SHA-1     
(BYTE-only) "The Britestream Cryptographic Module performs all the cryptography required for SSL/TLS applications. This module is a common element of the Britestream BN2010 SSL Security ASIC, the industry's first single-chip solution for completely off-loading SSL/TLS processing from host systems. The innovative in-line architecture combines TCP" |
341 | SkyTel Corp. 500 Clinton Center Drive Clinton, MS 39056 USA -Gagan Puranik
|
Version 1.0 |
Fujitsu MB90F482 processor w/ proprietary OS | 5/4/2005 |
SHA-1     
(BYTE-only) "SkyTel ST900 Secure 2Way is a multi-chip standalone wireless device. It provides data security for Narrowband PCS (ReFLEX) messaging." |
340 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
-Simon Gerraty
|
Version JUNOS_72_BP |
X86 w/ JUNOS | 4/21/2005 |
SHA-1     
(BYTE-only) "JUNOS-FIPS" |
339 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
-Simon Gerraty
|
Version JUNOS_72_BP |
X86 w/ JUNOS | 4/21/2005 |
SHA-1     
(BYTE-only) "JUNOS-FIPS" |
338 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
- Simon Gerraty
|
Version JUNOS_72_BP |
X86 w/ JUNOS | 4/21/2005 |
SHA-1     
(BYTE-only) "JUNOS-FIPS" |
337 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
-Simon Gerraty
|
Version JUNOS_72_BP |
X86 w/ JUNOS | 4/21/2005 |
SHA-1     
(BYTE-only) "JUNOS-FIPS" |
336 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Seyed Safakish
-Simon Gerraty
|
Version JUNOS_72_BP |
X86 w/ JUNOS;AS2 network processor w/ JUNOS microkernel | 4/21/2005 |
SHA-1     
(BYTE-only) "JUNOS-FIPS; Encryption module AS2-FIPS for use with M&T router" |
335 | Motorola Solutions, Inc. 1301 E. Algonquin Road Schaumburg, IL 60196 USA -Kirk Mathews
|
Version API R02.01 / Alg R01.00, API R01.00 / Alg R01.01 (Firmware) Part # 5185963A91 |
Proprietary hardware | 4/21/2005 |
SHA-1     
(BYTE-only) "The Armor cryptographic processor is used in security modules embedded in Motorola's Astro family of radio system products. It provides secure voice and data capabilities as well as APCO Over-The-Air-Rekeying and advanced key management." |
334 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Michael Teal
|
Version 2.4 |
Pentium 4 Processor w/ Windows XP and Windows 2000 | 4/18/2005 |
SHA-1     
(BYTE-only) "The Cryptek Agent IPSec software client is part of the Cryptek family of secure network products designed to control information based on: security labels, addresses, protocols, and services. The Cryptek Agent client is centrally managed, supports multiple concurrent VPN tunnels, and its security policies can be updated dynamically." |
333 | nCipher Corporation Ltd. Jupiter House, Station Road Cambridge, CB1 2JD United Kingdom -Marcus Streets
|
Version 4.0 (Firmware) |
Motorola Power PC running a proprietary Operating System | 4/18/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's secure e-commerce accelerators and Hardware Security Modules." |
332 | Check Point Software Technologies, Ltd. 12700 Sunrise Valley Drive, Suite 130 Reston, VA 20191 USA -Malcolm Levy
|
Version NG with Application Intelligence R55 |
Dual Processor Intel® Pentium® 4 Xeon w/ Linux; Single Processor Intel® Pentium® 4 Xeon w/ Linux; Dual Processor AMD-Opteron® Single Core w/ Linux; Single Processor AMD-Opteron® Single Core w/ Linux | 4/14/2005 |
SHA-1     
(BYTE-only) "Check Point Secure Platform NG with AI R55 offers a new option for deploying Check Point products. Secure Platform packages together a customized and hardened OS (with no unnecessary components that could pose security risks) and Check Point's industry-standard, market-leading FireWall-1 (FW-1) and VPN-1 NG." 06/13/08: Update OES'; |
331 | Oceana Sensor Technologies 1632 Corporate Landing Pkwy Virginia Beach, VA 23454 USA -Alex Kalasinsky
|
Version 1.0 |
Java Virtual Machine (JRE 1.4.2) w/ Windows 2000 with SP4 (Binary compatible with equivalent or later Microsoft Windows operating system versions including Windows 2000 SP4 and Windows XP) | 4/14/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Oceana Sensor Technologies Fortress Cryptographic Library (FCL) is a cryptographically secure interface to applications both internal and external to the OST product. It has many features and supports AES, Triple DES and RSA. It is entirely a software product." |
330 | Credant Technologies Corporation 15303 N Dallas Parkway, Suite 1420 Addison, TX 75001 USA -Chris Burchett
|
Version 1.5 |
Intel PXA270 w/ Palm OS 5.4.5 | 4/14/2005 |
SHA-1     
(BYTE-only) "CREDANT Cryptographic Kernel is a software-based cryptography library that implements 3DES, AES, SHA-1, HMAC, and ANSI X9.31 RNG for the CREDANT Mobile Guardian product. CREDANT Mobile Guardian enables enterprise-wide control of security for mobile & wireless users." |
329 | Bluesocket, Inc. 7 New England Executive Park Burlington, MA 01803 USA -Mike Puglia
|
Version Broadcom BCM5823-5 (Hardware) Part # BCM5823KPB-5 |
N/A | 4/14/2005 |
SHA-1     
(BYTE-only) "The Bluesocket Wireless Gateway IPSec implementation performs IPSec security services for the Bluesocket Wireless Gateway." |
328 | Dekart SRL 75, Alba Iulia Str. MD2071, Kishinev, Republic of Moldova -Olga Petrova
|
Version 2.0 |
Pentium 4 w/ Windows XP | 4/14/2005 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A standards-based cryptographic library (API) realizing data encryption and hashing algorithms (DES, Triple DES, AES, GOST 28147-89, SHA-1, SHA-256, SHA-384, SHA-512, GOST 3411-94, MD5) intended for internal and external implementations." 04/13/05: Update vendor address; |
327 | RedCannon Security 42808 Christy Street, Suite 108 Fremont, CA 94538 USA -Kurt Lennartsson
-Brian Wood
|
Version 1.3.0 |
Intel Pentium 4 w/ Windows XP | 4/6/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "Standalone module to provide cryptographic services to various other modules of RedCannon product." |
326 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 1.0 |
x86 w/ Windows 2003; x86 processor w/ Linux platform | 3/23/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder NSE (National Security Edition) is a standards-based cryptographic toolkit that covers the technology that was part of the 26 patents licensed by the NSA from Certicom. It also includes optimized implementations of Elliptic Curve Cryptography to ensure future approval. Security Builder NSE is part of the Certicom Security Architecture, a comprehensive modular and portable security solution which supports multiple cryptographic software and hardware providers with a single common API. Security Builder NSE can also be used in conjunction with other Certicom toolkits which include Security Builder Crypto, Security Builder ETS, Security Builder IPSec and Security Builder BSP, Security Builder PKI and Security Builder SSL." |
325 | Check Point Software Technologies, Ltd. 12700 Sunrise Valley Drive, Suite 130 Reston, VA 20191 USA -Malcolm Levy
|
Version NG with Application Intelligence R54 |
Pentium III w/ Linux | 3/23/2005 |
SHA-1     
(BYTE-only) "Check Point Secure Platform NG with AI R54 offers a new option for deploying Check Point products. Secure Platform packages together a customized and hardened OS (with no unnecessary components that could pose security risks) and Check Point's industry-standard, market-leading FireWall-1 (FW-1) and VPN-1 NG." |
324 | BeCrypt Ltd. Wyvols Court Swallowfield Reading, Berkshire RG7 1WY UK -Pali Surdhar
|
Version VER_7_09 |
X86 based processors w/ Windows XP Pro | 3/23/2005 |
SHA-256 
(BYTE-only) "Becrypt Crypto Library implements SHA 256 and AES algorithms for use within Becrypt's Product Set for Enterprise Data Security Solutions." |
323 | Funk Software, Inc. 222 Third Street Cambridge, MA 02142 USA -Steven Erickson
|
Version 1.0 |
x86 platform w/ Windows XP; x86 platform w/ Linux RedHat 9.0 | 3/23/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Odyssey Security Component/Portable is Funk Software, Inc.'s general purpose cryptographic library. Wide-ranging algorithm support is provided, making the library suitable for use in applications such as wireless LAN, IPsec, SSL/TLS, EAP, and so on. The portable (C) version can be compiled for use on a large variety of platforms." |
322 | Funk Software, Inc. 222 Third Street Cambridge, MA 02142 USA -Steven Erickson
|
Version 1.0 |
Windows XP on x86 platform; Linux RedHat 9.0 on x86 platform | 3/22/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Odyssey Security Component is Funk Software, Inc.'s general purpose cryptographic library. Wide-ranging algorithm support is provided, making the library suitable for use in applications such as wireless LAN, IPsec, SSL/TLS, EAP, and so on. Assembly language optimizations allow high-speed operation on specific platforms." |
321 | Kanguru Solutions 1360 Main Street Millis, MA 02054 USA -Nate Cote
|
Version 1.0 |
Windows XP on x86 platform | 3/18/2005 |
SHA-1     
(BYTE-only) "Kanguru Solutions is the leader in portable secure storage devices. KanguruLock, featured in the KanguruMicro Drive AES USB 2.0 Flash Drive, addresses security concerns and information assurance by incorporating 256-bit AES Encryption technology to portable storage devices." |
320 | Avaya, Inc. Atidim Technology Park, Bldg. 3 Tel-Aviv, 61131 Israel -Pesah Spector
|
Version 24.14.0 (Firmware) |
VxWorks, Motorola MPC8248 processor | 3/18/2005 |
SHA-1     
(BYTE-only) "The Avaya G250 Media Gateway and G250-BRI Media Gateway are complete branch office business communications systems that integrate an IP telephony gateway, an advanced IP WAN router, and a PoE LAN switch into a compact (2U) chassis. Ideally suited for enterprise with distributed branch office locations of 2-10 extensions, the G250 and G250-BRI Gateways replace the complexity and cost of managing disparate key and voice systems with a survivable networked solution that is easy to deploy and can be administered from a central location." |
319 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Glenn Constable
|
Version 2.1 (Firmware) |
Motorola PPC 8280 | 3/16/2005 |
SHA-1     
(BYTE-only) "The SafeNet QuickSec Library is a firmware-based cryptographic library that implements FIPS-approved IPSec algorithms for the SafeEnterprise family of products. SafeEnterprise devices provide secure communications across a range of networks." |
318 | SafeNet BV Boxtelseweg 26A 5261 NE Vught, The Netherlands -Egied Bormans
|
Part # 1.1 |
N/A | 3/16/2005 |
SHA-1     
(BYTE-only) "The SafeXcel 1141 chip is a hardware chip providing the SHA-1 and HMAC-SHA1 algorithms." 6/6/05: Changed version number to 1.1; |
317 | SafeNet BV Boxtelseweg 26A 5261 NE Vught, The Netherlands -Egied Bormans
|
Part # 1.1 |
N/A | 3/16/2005 |
SHA-1     
(BYTE-only) "The SafeXcel 1741 is a hardware chip that provides the SHA-1 and HMAC-SHA-1 algorithms." 6/6/05: Changed version number to 1.1; |
316 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Dennis Joyce
|
Version 1.0 (Firmware) |
Intel Celeron microprocesor running @566MHz | 3/3/2005 |
SHA-1     
(BYTE-only) "Firmware implementation of SHA-1 and HMAC-SHA-1 used in the AirFortress gateway." |
315 | Athena Smartcard Solutions and Renesas 6F Marutaya Building 6-9 Yokoyama-Cho Hachioji Tokyo, 192-00081 Japan -Naomi Matsumoto
|
Version 2.4.6 (Firmware) Part # Renesas AE46C1 |
Emulators E6000 from Renesas, configured for emulating the AE46C1 chip | 3/3/2005 |
SHA-1     
(BYTE-only) "The Cryptographic Module is the combination of a Java Card Operating System software that implements FIPS approved cryptographic functions and a state-of-the-art secure single chip silicon hardware. Athena Smartcard Solutions OSS755, the software component of the cryptographic module is a standards compliant Java Card 2.1.1 technology and GlobalPlatform 2.1 Operating System. The physical component of the cryptographic module is the assembly of an IC chip (Renesas AE46C1) protected by different types of tamper-evident resin covers. www.athena-scs.com and www.renesas.com." 02/09/07: Update vendor Info and implementation name; |
314 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
Intel Xeon 32-bit Processor | 3/3/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
313 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
Intel Xeon 32-bit Processor | 3/3/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
312 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.11 (Firmware) |
32-bit Intel Xeon Processor | 2/25/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." 2/23/05: Update impl. name and version; |
311 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
32-bit Intel Xeon Processor | 2/25/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
310 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
32-bit Intel Xeon Processor | 2/25/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
309 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
32-bit Intel Xeon Processor | 2/25/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
308 | Caymas Systems Inc. 1179 N. McDowell Blvd., Suite A Petaluma, CA 94954 USA -Joe Howard
|
Version 1.00 (Firmware) |
32-bit Intel Xeon Processor | 2/25/2005 |
SHA-1     
(BYTE-only) "Caymas Systems enables, controls, and secures the extended enterprise with the world's first Identity-Driven Access Gateways, allowing enterprises, government agencies, and institutions to securely extend their information assets to remote employees, customers, partners and suppliers. These are the cryptographic algorithm implementations used by the Caymas Systems gateways." |
307 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Mike Harvey
|
Version 2.0 |
Java Virtual Machine (JVM) on a Windows 2003, x86 (Binary compatible to Windows 98/2000/XP) Platform;Java Virtual Machine (JVM) under Solaris, on a SPARC 32-bit and 64-bit Processor;Java Virtual Machine (JVM) Red Hat Linux Application Server 3.0 (Binary compatible to AS 2.1), on a 32-bit x86 Processor | 2/16/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. Security Builder GSE is intended for use by developers who want government level security and can also be used in conjunction with other Certicom developer toolkits including Security Builder PKI and Security Builder SSL." 06/14/07: Add new OES; |
306 | 3e Technologies International, Inc. 700 King Farm Blvd, Suite 600 Rockville, MD 20850 USA -Ryon Coleman
|
Version 1.0 |
Intel® Pentium® M 1.5GHz w/ Windows XP SP2; Intel® Pentium® M 1.8GHz w/ Windows NT SP6; Intel® Pentium® M 1.7GHz w/ Windows 2000 SP4; Intel® PXA255 400 MHz w/ Pocket PC 2002 (Windows CE 3.0.11171 Build 11178);Intel® PXA255, 400 MHz w/ Pocket PC 2003 (Windows CE 4.20.1081 Build 13100) | 2/15/2005 |
SHA-1     
(BYTE-only) "AirGuardTM Wireless Solutions implement leading cryptographic technologies including: AES, 3DES, SHA-1, HMAC SHA-1, 802.1x/EAP-TLS, Diffie-Hellman, RSA, and HTTPS/TLS. The solutions are implemented in an innovative manner so that critical performance is not sacrificed in providing a rugged FIPS 140 -2 secure solution. Additionally, the AirGuard Solution features an RF Manager that allows the adjustment of WLAN RF output power level, providing close or broad coverage with high throughput. AirGuardTM Crypto Client includes the following models: AirGuardTM 3e-010F Crypto Client Software, v2.04 for Windows NT4/2000/XP/Pocket PC 2002/Pocket PC 2003 AirGuardTM 3e-010F-C Crypto Client Software, v1.0 Build 14 for Windows 2000/XP AirGuardTM 3e-010F-A Crypto Client Software, v1.0 Build 7 for Windows 2000/XP" |
305 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Don Dumitru
|
Version 5.01 |
ARMv4i w/ Windows CE 5.01; AMD Athlon 800MHz w/ Windows CE 5.01; Intel Pentium 4 w/ Windows CE 5.00; MIPS-IV (NEC VR-5477) w/ Windows CE 5.00; ARMv4i (ARM920T) w/ Windows CE 5.00 | 2/15/2005 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Microsoft Windows CE Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography." 11/02/06: Update Version; |
304 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Adam Bell
|
Part # 184x ASIC chip |
N/A | 2/15/2005 |
SHA-1     
(BYTE-only) "The 184x is a series of chips that provide cryptographic services." |
303 | PalmSource, Inc. 1240 Crossman Drive Sunnyvale, CA 94089 USA -Richard Levenberg
|
Version 1.0 |
400 MHz Intel (r) PXA 255 processor w/ PalmOS version 5.2.1 | 2/16/2005 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "PalmSource Algorithms v1.0 is incorporated in the PalmOS version 5.2.1 Cryptographic Provider Manager." |
302 | JP Mobile Inc. 12000 Ford Road, Suite 400 Dallas, TX 75234 USA -Kishore Kankipati
|
Version 5.0.050107 |
PXA255 Intel XScale 400 MHz w/ Pocket PC 2003 Premium (version: 4.20.0) | 2/15/2005 |
SHA-1     
(BYTE-only) ""SureWave Mobile Defense Security Kernel" is a 32-bit Windows library compatible with Microsoft Pocket PC 2003 Premium operating system. This module provides cryptographic services for applications written in C++ through Application Program Interface." |
301 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 1v3 (Firmware) |
JavaCard 2.1.1 Runtime Environment | 2/15/2005 |
SHA-1     
(BYTE-only) "The Cyberflex Access 64K V2 smart card can be employed in solutions which provide secure PKI (publik key infrastructure) and digital signature technology. Cyberflex Access 64K V2 serves as a highly portable, secure token for enhancing the security of network access and ensuring secure electronic communications." |
300 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Michael Soto
|
Version 12.3(11)T3 |
QED RM5261A MIPS 240 MHz w/ Cisco IOS 12.3 ; RM7065C MIPS 450MHz w/ Cisco IOS 12.3(11)T3; BCM1125H 500MHz (3825) / 650MHZ (3845) w/ Cisco IOS 12.3(11)T3; RM7065C MIPS at 350MHz w/ Cisco IOS 12.3(11)T3; RM5261A MIPS at 350MHz w/ Cisco IOS 12.3(11)T3; RM5261A MIPS 350MHz w/ Cisco IOS 12.3(11)T3; BCM1125H 500MHz (3825) w/ Cisco IOS 12.3(11)T3 | 2/3/2005 |
SHA-1     
(BYTE-only) "Cisco IOS Software, the industry-leading and most widely deployed network system software, delivers intelligent network services on a flexible networking infrastructure that enables the rapid deployment of Internet applications." |
299 | Nortel 600 Technology Park Billerica, MA 01821 USA -Jonathan Lewis
-Simon McCormack
|
Version 5.11 |
Intel Pentium 4 CPU 2.99GHz w/ MS Windows XP Professional with Service Pack 2 | 2/3/2005 |
SHA-1     
(BYTE-only) "The Contivity VPN Client provides stable, secure network access via Nortel VPN routers and VPN gateways. The client can be preconfigured and customized by IT administrators for quick install and connect, or easily configured by end users via the connection wizard. The VPN client works over all IP infrastructures including all wireless, broadband, and satellite services. The VPN client also supports seamless roaming, enabling a user to roam wirelessly without losing the virtual connection." |
298 | Wei Dai 13440 SE 24th Street Bellevue, WA 98005 USA -Wei Dai
|
Version 5.2.3 |
Intel Pentium 4 1.6GHz w/ Windows 2000 Professional | 1/28/2005 |
SHA-224 
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto++ Library is a free, open source C++ class library providing public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms." |
297 | Utimaco IS GmbH Germanusstrasse 4 Aachen, D-52080 Germany -Rainer Herbertz
|
Version 1.0.0.0 (Firmware) Part # 1.0.2.0 |
CryptoServer© 2000 | 1/25/2005 |
SHA-1     
(BYTE-only) "The CryptoServer© 2000 is an encapsulated, highly tamper protected hardware security module which provides secure cryptographic services like en- or decryption, hashing, signing and verifying of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
296 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 4.0 (Firmware) |
32-bit ARM 7 Processor w/ BlackBerry Operating System Version 4.0 | 1/25/2005 |
SHA-224 
(BYTE-only) SHA-384  (BYTE-only) "BlackBerry® is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry® is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry® Cryptographic API provides advanced cryptographic functionality for BlackBerry® Wireless Handhelds.." |
295 | AirMagnet, Inc. 1325 Chesapeake Terrace Sunnyvale, CA 94089 USA -Tony Ho
|
Version 5.01 (Firmware) |
IDT Interprise Integrated Communications Processor 79RC23438 | 1/25/2005 |
SHA-1     
(BYTE-only) "The SmartEdge Sensor is equipped with patent pending AirWISE Analytical Engine that, in real time, monitors and analyzes the security, performance, and reliability of the wireless network." |
294 | Litronic, Inc. 17861 Cartwright Road Irvine, CA 92614 USA -Cameron Durham
|
Version 3.1 (Firmware) Part # P/N 020-2010, Version B2 |
jForte | 1/14/2005 |
SHA-1     
(BYTE-only) "ASIC" |
293 | WRQ 1500 Dexter Ave. North Seattle, WA 98109 USA -Donovan Deakin
|
Version 1.1 |
Intel Pentium 400 (Dell Optiplex GX 400) w/ Windows 2000 Prof (SP3, Q326886 Hotfix); Intel Xeon processor (HP Proliant ML 330) w/ Windows 2000 Server (SP3 and Q326886);Apple Power Macintosh G4 w/ MacOS X 10.3.3 and Apple Java Runtime Env 1.4.2 | 1/14/2005 |
SHA-1     
(BYTE-only) "Reflection® for the Web provides terminal emulation from a web browser. With this server-based solution you can connect local or remote users to applications on IBM, HP, UNIX, and OpenVMS hosts. You can also use its comprehensive management, security, and customization features to boost IT efficiency and user productivity." |
292 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Michael Teal
|
Version 2.1.9 (Firmware) Part # 5110N0017-4 |
Cryptek Secure Executive (CSE) | 1/14/2005 |
SHA-1     
(BYTE-only) "The CSM is a centrally managed secure network product designed to control the flow of information. Information is controlled on the basis of: security labels, addresses, protocols, and services. The CSM constitutes the core technologies used in all Cryptek Diamond TEK products." |
291 | Broadcom Corporation 16215 Alton Parkway Irvine, CA 92618 USA -Steve Goodell
-Joseph Wallace
|
Part # BCM5812 |
N/A | 1/14/2005 |
SHA-1     
(BYTE-only) "The BCM5812 is a full-featured security processor optimized to provide multi-protocol cryptographic acceleration for cost sensitive VPN and eCommerce applications." |
290 | Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version E311 (Firmware) Part # 90 |
JavaCard 2.2 Runtime Environment | 1/3/2005 |
SHA-1     
(BYTE-only) "The Oberthur Card Systems ID-One Cosmo 32 RSA Chip Platform is a single chip multi-application cryptographic JavaCard module specifically designed for identity and government market needs. The cryptographic module offers a highly secure architecture with up to 32KB of EEPROM space available for customer discretionary use, together with cryptographic services such as Triple-DES (2 and 3 keys); RSA (up to 2048 bits and including key generator), SHA-1, and MD5. It also includes a native implementation of the latest JavaCard™ (v2.2) and Open Platform (v2.1.1) specifications, with full support for Delegated Management and DAP/mandated DAP which define a secure infrastructure for post-issuance programmable platforms. Additional features include biometric extensions as defined by the JavaCard Forum and Logical Channels." |
289 | Snapshield Ltd. 2 Habarzel Street Tel Aviv, 69710 Israel -Victor Elkonin
-Shimon Zigdon
|
Version 2.03 (Firmware) |
Texas Instruments C54 DSP | 1/3/2005 |
SHA-1     
(BIT) "Snapshield's total telephony security solutions create transparent safe communication zones, providing organizations with the most effective protection for voice and fax communications. The solution involves connecting encryption terminals: SNAPfone for fixed line, SNAPcell and SNAPsoft for mobile phones and SNAPtrunk for ISDN trunks." |
288 | TLC-Chamonix, LLC 120 Village Square, Suite 11 Orinda, CA 94563 USA -Phil Smith
|
Version 3.3 |
Intel processor w/ Windows 2000/XP | 12/22/2004 |
SHA-1     
(BYTE-only) "The WirelessWall product is a cryptographic software system for wireless LANs that enforces network access rights, secures authorized traffic, and provides seamless mobility to users as they move across subnets. The WirelessWall client software installs onto a standard Intel-based platform running Windows 2000/XP." 07/08/09: Update vendor information; |
287 | TLC-Chamonix, LLC 120 Village Square, Suite 11 Orinda, CA 94563 USA -Phil Smith
|
Version 3.05e |
Intel processor w/ RedHat Fedora Core1 | 12/22/2004 |
SHA-1     
(BYTE-only) "The Cranite Wireless Access Controller® is a cryptographic software system for wireless LANs that enforces network access rights, secures authorized traffic, and provides seamleass mobility to users as they move across subnets. The Wireless Access Controller software installs onto a standard enterprise-class hardware platform." 07/08/09: Update vendor information; |
286 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version 1010(0)-(00), V5.0 (Firmware) Part # 070-0016-000 |
Proprietary hardware platform running ScreenOS 5.0 on IXP425 | 12/22/2004 |
SHA-1     
(BYTE-only) "Juniper Networks NS-5GT" |
285 | Broadcom Corporation 1131 W Warner Road Tempe, AZ 85284 USA -Steve Goodell
|
Part # BCM5823 rev AO |
N/A | 12/20/2004 |
SHA-1     
(BYTE-only) "The BCM5823 is a high performance security processor that provides multi-protocol cryptographic acceleration for VPN and eCommerce applications." |
284 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Michael Teal
|
Version 2.1.9 (Firmware) Part # 5110N0017-3 (Hardware) |
Cryptek Secure Executive (CSE) | 12/2/2004 |
SHA-1     
(BYTE-only) "The CSM is a centrally managed secure network product designed to control the flow of information. Information is controlled on the basis of: security labels, addresses, protocols, and services. The CSM constitutes the core technologies used in all Cryptek Diamond TEK products." |
283 | Tauá Biomática S/A Av. Presidente Vargas, 417, 5o. Andar Centro Rio de Janeiro, RJ, CEP 20071-003 Brazil -Marcio Lima
|
Version 2.0 (Firmware) |
NIOP | 11/22/2004 |
SHA-1     
(BYTE-only) "ZYT is a Hardware Security Module (HSM) designed to encrypt and digitally sign documents/transactions." |
282 | Tauá Biomática S/A Av. Presidente Vargas, 417, 5o. Andar Centro Rio de Janeiro, RJ, CEP 20071-003 Brazil -Marcio Lima
|
Version 2.0 (Firmware) |
NIOP | 11/22/2004 |
SHA-1     
(BYTE-only) "ZYT is a Hardware Security Module (HSM) designed to encrypt and digitally sign documents/transactions." |
281 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Michael Teal
|
Version 2.1.9 (Firmware) Part # 5110N0017-2 (Hardware) |
Cryptek Secure Executive (CSE) | 11/22/2004 |
SHA-1     
(BYTE-only) "The CSM is a centrally managed secure network product designed to control the flow of information. Information is controlled on the basis of: security labels, addresses, protocols, and services. The CSM constitutes the core technologies used in all Cryptek DiamondTEK products." |
280 | Tauá Biomática S/A Av. Presidente Vargas, 417, 5o. Andar Centro Rio de Janeiro, RJ, CEP 20071-003 Brazil -Marcio Lima
|
Version 2.0 (Firmware) |
NIOP | 11/22/2004 |
SHA-1     
(BYTE-only) "ZYT is a Hardware Security Module (HSM) designed to encrypt and digitally sign documents/transactions." |
279 | Schweitzer Engineering Laboratories, Inc. 2350 NE Hopkins Court Pullman, WA 99163 USA -David Whitehead
|
Version 0.7 (Firmware) |
FPGA Processor | 11/17/2004 |
SHA-1     
(BYTE-only) "The SEL-3021 Serial Encrypting Transceiver is a standalone, bump in the wire encryption device based on Advanced Encryption Standard (AES) and NIST-Approved Federal Infromation Processing Standard (FIPS 197). It is designed to add strong cryptographic security to EIA-232 serial communication links including..." |
278 | 3e Technologies International, Inc. 700 King Farm Blvd, Suite 600 Rockville, MD 20850 USA -Ryon Coleman
|
Version 3.0.18.11 (Firmware) |
Linux (Monta Vista) 2.4.17-mvl21-ixdp425 | 11/17/2004 |
SHA-1     
(BYTE-only) "Validation of Cryptographic Algorithms for the 3e Xscale-Based Wireless Access Points" |
277 | Voltage Security, Inc. 1070 Arastradero Road, Suite 100 Palo Alto, CA 94304 USA -Matt Pauker
|
Version 2.0 |
Intel Pentium 4 w/ Windows 2000, Windows 2003, Windows XP Service Pack 2 | 11/17/2004 |
SHA-1     
(BYTE-only) "The Voltage IBE Cryptographic Module is a component of the Voltage IBE Toolkit, a set of development tools that enable any application to quickly and easily use Identity Based Encryption (IBE) to secure data. IBE uses simple strings like email or IP addresses as public keys, eliminating the need for certificates and associated management. The Voltage IBE Cryptographic Module also contains implementations of 3DES, AES, SHA-1, and DSA. The Voltage IBE Toolkit is available for download at http://developer.voltage.com" |
276 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.5.0 |
Pentium 4 w/ MS Windows XP Professional SP-1 | 11/5/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." 03/11/08: Update vendor contacct information; |
275 | AEP Networks Focus 31, West Wing Cleveland Road Hemel Hempstead, Herts HP2 7BW UK -David Miller
|
Part # 010837 v2 rel 3 |
N/A | 11/5/2004 |
SHA-1     
(BYTE-only) "The AEP Networks Advanced Configurable Crypto Environment (ACCE) provides highly secure cryptographic services and key storage. It is used in a range of AEP systems and OEM products including the SureWare keyper family." |
274 | RELM Wireless Corporation 7100 Technology Drive West Melbourne, FL 32904 USA -Jim Spence
-Tess Zagaruyka
|
Version 0721-05056-000 (Firmware) |
DPHxe | 10/26/2004 |
SHA-1     
(BYTE-only) "SHA-1 hash algorithm designed for use in BK Radio secure communications products." |
273 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Alan Myrvold
|
Version 1.0 |
UltraSPARC-11i, 300 Mhz processor w/ Solaris 9 Operating System; Intel Pentium 4, 2.8 Ghz processor w/ Windows XP (SP1) | 10/19/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Security Toolkit for Java takes advantage of the features of a Public Key Infrastructure (PKI) from a Java environment. The Toolkit provides the means to incorporate security features, such as encryption and digital signatures, into applications." 11/2/04: Update impl. name and OS correction; |
272 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 1.9 |
Intel Pentium 4M 1.8GHz w/ Windows 2000 Service Pack 4; AIX 5L v5.2 PowerPC POWER3; PA-8500 RISC 2.0 w/ HP-UX 11.0; PA-8500 RISC 2.0W w/ HP-UX 11.0; Intel PXA255 w/ PocketPC 2003; Intel Pentium 4 2.4GHz w/ Red Hat Linux 7.2; Intel Pentium 4 2.66GHz w/ Red Hat Enterprise Linux Advanced Server 3.0; PowerPC 750 w/ VxWorks 5.4 PowerPC 604; PM826 processor w/ Works 5.5 PowerPC 603; PowerPC 7410 w/ VxWorks 5.5 PowerPC 604; UltraSPARC IIIi 1.28 GHz w/ Solaris 8 32-bit & 64-bit; PA-RISC PA8500 2.0 w/ HP-UX 11.11; PA-RISC PA8500 2.0W w/ HP-UX 11.11 | 10/14/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The Crypto-C Micro Edition (ME) Module is RSA Security, Inc.'s cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors while offering great flexibility and choice by allowing developers to select only the algorithms needed in reduced code sizes. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more." 11/02/04: Added OS AIX 5L v5.2 PowerPC POWER3; |
271 | SBI Net Systems Co., Ltd Meguro Tokyu Bldg., 5th Floor 2-13-17 Kamiosaki Shinagawa-ku Tokyo, 141-0021 Japan -Hidemitsu Noguchi
|
Version 1.0.0 |
Pentium 4.2.4 GHz w/ Windows XP SP1 | 10/14/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "C4CS Lite is a cryptographic library, which provides a variety of cryptographic services, both FIPS Approved/NIST recommended and non-Approved, such as symmetric/asymmetric ciphers, hash functions, and secret sharing schemes. The software module can support a wide range of operating systems, such as Windows, Linux, Solaris, HP-UX, AIX, and others." 08/28/08: Update vendor information; |
270 | SafeNet Canada, Inc. 20 Colonnade Road, Suite 200 Ottowa, ON K2E 7M6 Canada -Terry Fletcher
|
Version 4 (Firmware) |
Processor: Strong Arm II, 80200, 600 Mhz; OS: N/A; Hardware: Platform: VBD-02-0200 | 10/12/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Protects and manages cryptographic keys and accelerates cryptographic operations" |
269 | Neoscale Systems 1655 McCarthy Blvd. Milpitas, CA 95035 USA -Dharmesh Shah
-Rose Quijano-Nguyen
|
Version 1.0 (Firmware) |
PowerPC Processor; Intel X86 | 10/12/2004 |
SHA-1     
(BYTE-only) SHA-512  (BYTE-only) "The CryptoStor Cryptographic Library v1.0 provides encryption services performed through software for NeoScale's CryptoStor family of products" 3/30/05: Update OE from CryptoStor Operating System to PowerPC Processor; |
268 | Utimaco IS GmbH Germanusstrasse 4 Aachen, D-52080 Germany -Rainer Herbertz
|
Version 1.0.0.0 (Firmware) Part # HW Version 1.0.2.0 |
CryptoServer® 2000 | 10/12/2004 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) "The CryptoServer® 2000 is an encapsulated, highly tamper protected hardware security module which provides secure cryptographic services like en- or decryption, hashing, signing and verifying of data, random number generation, on-board secure key generation, key storage, and further key management functions." |
267 | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 USA -Ray Potter
-Nick Rowen
|
Version 0x128 (Firmware) |
EP1C20F324C7 | 10/12/2004 |
SHA-1     
(BYTE-only) "The Cisco 1841 and Cisco 2801 Integrated Services Routers as part of Cisco's integrated services router portfolio offer secure data, voice and video connectivity (Note: Cisco 1841 supports data applications only) for small-to-medium-sized businesses and small enterprise branch offices. The routers support the Cisco IOS cross-platform images offering in the security images support for security features such as Network Admission Control (NAC) for anti-virus defense, Virtual Private Network (VPN) and inline intrusion protection. In addition, the Cisco 1841 and 2801 support encrypted VPN tunnels using Cisco IOS IPSec, and DES/3DES/AES encryption in hardware" 06/03/08: Update OS; |
266 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Juan Asenjo
|
Part # 1213E130_PL_Iss003 |
N/A | 10/12/2004 |
SHA-1     
(BYTE-only) "The DCAP Security Module is a multiple-chip embedded cryptographic module installed in the Datacryptor® Advanced Performance Cryptographic Module (known as the Datacryptor® AP). It secures communications using signed Diffie-Hellman key exchange and Triple-DES or AES encryption over IP networks. It provides data encryption rates of up to 100 Megabits per second (Mbps)." |
265 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 2.0 |
32-bit (x86 Processor) w/ Windows NT4 SP6a | 9/29/2004 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry® is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry® is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry® Cryptographic Kernel is the software module that provides the basic cryptographic functionality for the BlackBerry®." |
264 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 3.8 (Firmware) |
32-bit ARM 7 Processor w/ BlackBerry Operating System Version 3.8.0; BlackBerry OS Ver 4.0.0 - ARM Processor 32-bit; BlackBerry OS Ver 4.1.0 - ARM 7 Processor 32-bit | 9/29/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-512  (BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corportate data, phone, web and organizer features. The BlackBerry Cryptographic Kernel is the software module that provides the base cryptographic functionality for the BlackBerry Wireless Handhelds." |
263 | WRQ 1500 Dexter Ave. North Seattle, WA 98109 USA -Eric Raisters
|
Version 12.0.3 |
Intel w/ Microsoft Windows XP | 9/24/2004 |
SHA-1     
(BYTE-only) "WRQ Reflection software provides a complete range of terminal-emulation and PC X-server solutions for host access. Each solution is specifically designed to boost IT efficiency and user productivity and includes full support for popular network security protocosl such as Secure Shell, SSL/TLS, and Kerberos." |
262 | WRQ 1500 Dexter Ave. North Seattle, WA 98109 USA -Eric Raisters
|
Version 12.0.3 |
Intel w/ Microsoft Windows XP | 9/24/2004 |
SHA-1     
(BYTE-only) "WRQ Reflection software provides a complete range of terminal-emulation and PC X-server solutions for host access. Each solution is specifically designed to boost IT efficiency and user productivity and includes full support for popular network security protocols such as Secure Shell, SSL/TLS, and Kerberos." |
261 | WRQ 1500 Dexter Ave. North Seattle, WA 98109 USA -Eric Raisters
|
Version 12.0.3 |
Intel w/ Microsoft Windows XP | 9/24/2004 |
SHA-1     
(BYTE-only) "WRQ Reflection software provides a complete range of terminal-emulation and PC X-server solutions for host access. Each solution is specifically designed to boost IT efficiency and user productivity and includes full support for popular network security protocols such as Secure Shell, SSL/TLS, and Kerberos." |
260 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Atsushi Yamada
-Randy Tsang
|
Version 2.0 |
x86 w/ Linux 32-bit; Itanium w/ Linux 64-bit; x86 w/ Win2003 32-bit; Itanium w/ Win2003 64-bit; PowerPC w/Unix 32 & 64-bit; SPARC w/ Solaris 32 & 64-bit; RISC w/ Unix 32 & 64-bit; Itanium w/ Unix 64-bit; ARM processor W/ Windows CE 3.0; ARM processor w/ Symbian 9; x86 Processor w/ Linux 64 bit; x86 w/ WindowsXP 64 bit; X86 processor w/ Windows Vista; Intel Core 2 w/ Windows Vista 64 bit; Intel Itanium 2 w/ HPUX B11 32-bit IA64; Intel Pentium III w/ Solaris 8 32 Bit; AMD Opteron w/ Solaris 10 64 Bit; IBM PowerPC 5 w/ Redhat Linux AS 4.0 32 bit; IBM PowerPC 5 w/ Redhat Linux AS 4.0 64 bit | 9/16/2004 |
SHA-1     
(BYTE-only) SHA-224  (BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Security Builder GSE is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications." 06/15/07: Add new OES; |
259 | IBM Corporation 11400 Burnet Road Austin, TX 78758 USA -Tom Benjamin
|
Version 1.2 |
Intel Pentium 4 2.6 GHz w/ Windows XP Service Pack 2 | 9/9/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for Multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework that is part of all JVM's at the 1.4.0 level and higher." |
258 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 1.0 Part # 7855 |
N/A | 9/9/2004 |
SHA-1     
(BYTE-only) "The HIPP 7855 security processors packaged as part numbers 7855PP4 and 7855PP6 are highly-integrated cryptographic processors capable of performing DES, 3DES, ARC4, AES, MD5, SHA-1 and HMAC at speeds up to half-duplex OC-3. The 7855's on-board DPU processes protocols based on the available hardware algorithms.This currently includes IPv4/IPv6, IPsec, IPPCP and PPTP." |
257 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 1.0 Part # 7815 |
N/A | 9/9/2004 |
SHA-1     
(BYTE-only) "The HIPP 7855 security processors packaged as part numbers 7815PP4 and 7815PP6 are highly-integrated cryptographic processors capable of performing DES, 3DES, ARC4, AES, MD5, SHA-1 and HMAC at speeds up to half-duplex OC-3. The 7815's on-board DPU processes protocols based on the available hardware algorithms.This currently includes IPv4/IPv6, IPsec, IPPCP and PPTP." |
256 | Avaya, Inc. Atidim Technology Park, Bldg. 3 Tel-Aviv, 61131 Israel -Pesah Spector
|
Version 23.10.50 (Firmware) |
VxWorks | 8/23/2004 |
SHA-1     
(BYTE-only) "The Avaya G350 Media Gateway is a powerful converged networking device that packs an IP telephony gateway, an advanced IP WAN router, and a high-performance LAN switch into a compact (3U) modular chassis. In addition, the G350 is a VPN IP-SEC based gateway, ideal for branch offices deployments that require an integrated solution for advanced data and Voice over IP applications. Designed to be a complete voice/data networking solution, the G350 Gateway is well suited for enterprises with distributed branch office locations using 8-40 extensions." |
255 | nCipher Corporation Ltd. Jupiter House, Station Road Cambridge, CB1 2JD United Kingdom -Marcus Streets
|
Version 3.0 (Firmware) |
Motorola Power PC running a proprietary Operating System | 8/23/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's secure e-commerce accelerators and Hardware Security Modules." |
254 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Mike Siegel
|
Version 4.2 |
FOR AES, DSA, SHA, RNG: AMD Athalon XP w/ Windows XP,SP1; FOR RNG: Pentium III -733 w/ Windows 2000 | 8/23/2004 |
SHA-1     
(BYTE-only) "McAfee Endpoint Encryption for Devices is a high performance software solution that provides sector-level encryption of a PC's hard drive in a manner that is totally transparent to the user. In addition, the centrahzed McAfee Endpoint Encryption management system provides robust recovery tools, administration, and implementation." 05/13/08: Update vendor and implementation information; |
253 | Credant Technologies Corporation 15303 N Dallas Parkway, Suite 1420 Addison, TX 75001 USA -Chris Burchett
|
Version 1.4 |
Intel PXA250 w/ Windows CE 3.0 | 8/23/2004 |
SHA-1     
(BYTE-only) "CREDENT Cryptographic Kernel is a FIPs-140-2 compliant, software-based cryptography library that implements 3DES, AES, SHA-1, and ANSI X9.31 RNG algorithms for the CREDANT Mobile Guardian product. CREDANT Mobile Guardian enables enterprise-wide control of security for mobile & wireless users." |
252 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 7902 |
N/A | 8/11/2004 |
SHA-1     
(BYTE-only) The SHA-1 implementation does not process message lengths > 1500 bytes. "The 7902 Security Processor provides hardware acceleration for symmetric key encryption (DES, 3DES, ARC4), authentication (SHA-1, MD5), and data compression (LZS, MPPC). The 7902 also includes a math processor (2048-bit modular arithmetic and exponentiation) and a true hardware random number generator to support public key cryptography." |
251 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Glenn Constable
|
Version 1.0 |
Motorola PPC 8280 processor w/ Linux 2.4.18 kernel w/ real time extensions | 8/12/2004 |
SHA-1     
(BYTE-only) "The SafeEnterprise Encryptor II Cryptographic Library is a software-based cryptography library that implements 3DES, DES and SHA-1 algorithms for the SafeEnterprise Encryptor II family of products which provide Layer 2 secure communications across ATM and SONET network." |
250 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
-David Finkelstein
|
Version 3.5 |
Pentium IV 1.4 GHz w/ Microsoft Windows XP | 8/4/2004 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "There are two variants of the Crypto-J module, one which implements an RSA Security-specific API [jsafeFIPS] and the other which implements the Java Cryptographic Extensions (JCE) API [jsafeJCEFIPS]." |
249 | Forum Systems 45 West 10000 South, Suite 415 Sandy, Utah 84070 USA -Terry Wise
|
Version 4.0 |
Intel Xeon w/ Forum OS Version 4.1 | 8/4/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "Forum FIA Gateway provides the foundation infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. These are the software algorithm implemenations utilized by the Forum FIA Gateway." |
248 | Symantec Corporation One Old Oyster Point Road, Suite 300 Newport News, VA 23602 USA -Cecilia C. Holmes-Addison
|
Version 1.0 |
Dual Xenon 2.66 GHZ, Microsoft Windows XP Professional, SP1;Dell Dimension 4400, Pentium 4, 1.6GHz CPU, Microsoft Windows 2000 Professional, Service Pack 4 | 7/15/2004 |
SHA-1     
(BYTE-only) This product does not hash messages of zero length. "The Symantec Cryptographic Module is a software library that contains FIPS-approved cryptographic algorithms. This module provides encryption functionality for selected Symantec products." Testing on Dual Xenon 2.66 GHZ, Microsoft Windows XP Professional, SP1 - CAVS3.1; Testing on Dell Dimension 4400, Pentium 4, 1.6GHz CPU, Microsoft Windows 2000 Professional, Service Pack 4 - CAVS4.0 |
247 | Perkons SA Av. Marginal Jose de Anchieta 458-zip code: 83408-010 Colombo, PR Brazil -Antonio G. Ferraz Junior
-Luiz Ricardo R. Barbosa
|
Version 1.0 |
Pentium IV, 1.5 MHz w/ Windows XP/Linux | 7/13/2004 |
SHA-1     
(BYTE-only) "The 'Perkons CryptoLib' is a software-based cryptography library that implements AES, SHA-1 and RSA algorithms for all Perkons S/A products. Perkons S/A is a company that makes vehicle speed measuring and classifying products, red light violation camera products, public security monitoring systems and optical character recognition equipments, that supply images and data in a secure environment to be used by government agencies for electronic traffic enforcement." |
246 | Kasten Chase Applied Research, Ltd. 5100 Orbitor Drive Mississauga, Ontario L4W 4Z4 Canada -Steve Demmery
|
Version 2.0 |
x86 Linux | 7/7/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "KCCE is an independent, executable cryptographic module that exists variously as a dynamic linked library (dll), a shared library and a driver. KCCE provides software designers with a comprehensive API that ensures secure cryptographic application development, for a wide range of operating systems, without undue complexity." |
245 | IBM Corporation 2455 South Road Poughkeepsie, NY 12601 USA -Walter Von Dehsen
|
Part # 1.0 |
N/A | 7/1/2004 |
SHA-1     
(BYTE-only) "The IBM zSeries CP Assist feature provides processor-integrated hardware acceleration for DES, TDES and SHA-1 services." |
244 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Kenneth Jensen - Dir of Prod Mgmt
|
Version CN1000 Part # 1000199-01 |
N/A | 6/15/2004 |
SHA-1     
(BYTE-only) "Aruba Wireless Networks’ WLAN switching platform is a purpose-built WLAN voice and data switching solution designed to specifically address the needs and reduce the cost of large scale Wi-Fi network deployments for Government agencies and large enterprise. The Aruba Wireless Networks WLAN switching platform is a highly scalable and redundant solution that provides centralized intelligence to secure and manage the corporate RF environment, enforce identity based user security policies, enable service creation and provide secure mobility management to thousands of simultaneously connected users." |
243 | Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089-1113 USA -Kenneth Jensen - Dir of Prod Mgmt
|
Version 5000 Series |
600 MHz Pentium-3 w/ RedHat Linux 7.3, kernel version 2.4.18-3 | 6/15/2004 |
SHA-1     
(BYTE-only) "Aruba Wireless Networks’ WLAN switching platform is a purpose-built WLAN voice and data switching solution designed to specifically address the needs and reduce the cost of large scale Wi-Fi network deployments for Government agencies and large enterprise. The Aruba Wireless Networks WLAN switching platform is a highly scalable and redundant solution that provides centralized intelligence to secure and manage the corporate RF environment, enforce identity based user security policies, enable service creation and provide secure mobility management to thousands of simultaneously connected users." |
242 | Realia Technologies S.L. Orense, 68 11th floor Madrid, 28020 Spain -Sebastián Muñoz
|
Version 01.04.0004 Part # Model 1.0 |
N/A | 6/7/2004 |
SHA-1     
(BIT) "The Cryptosec2048 is a high-end PCI card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing (RSA, DES, SHA-1, MD5,...) and features a tamper-protective case to physically protect sensitive information contained within the card." |
241 | Prism Payment Technologies (Pty) Ltd PO Box 901 Witkoppen, Gauteng 2068 South Africa -Wayne Donnelly
|
Version 1.1.0.0 (Firmware) |
Pentium III 450MHz | 6/7/2004 |
SHA-1     
(BYTE-only) "The Incognito TSM410 is a multi-chip embedded Tamper Responsive Security Module. Fitted on a PCI carrier card, the device offers high-performance, high-security services targeted at EFT switches and mCommerce applications." |
240 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Entrust Sales
|
Version 7.0 |
Intel Pentium 4 w/ Windows 2000 SP3 | 6/3/2004 |
SHA-256 
(BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "A software cryptographic library used in the Entrust Authority Toolkit for Java" |
239 | PC Guardian Technologies, Inc. 1133 East Francisco Blvd. San Rafael, CA 94912 USA -Seth Ross
|
Version 1.0.1 |
Intel Pentium III, 900 Mhz w/ Windows 2000 SP4 | 5/25/2004 |
SHA-1     
(BYTE-only) does not support the null message. "The Encryption Plus Crypographic Library (EPCL) is a compact and fast encryption library that provides an Application Programming Interface (API) featuring NIST Approved AES encryption, SHA-1 hashing, and pseudo-random generation." |
238 | E.F. Johnson 123 N. State Street Waseca, MN 56093 USA -John Oblak
|
Version 3.3 (Firmware) |
E.F. Johnson Portable Radios | 5/20/2004 |
SHA-1     
(BYTE-only) "This is the E.F. Johnson implementation of the SHA-1 algorithm. This algorithm is used in the E.F. Johnson mobile and portable radios." |
237 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1 |
Intel P4 1.8 GHz w/ RedHat Enterprise Linux 3 AS; 1 GHz UltraSPARC IIIi w/ Solaris 8.0 | 5/10/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The F-Secure® Cryptographic Library™ for Linux is a 140-2 Level 1 compliant software module, which provides an assortment of cryptographic services including symmetric and asymmetric encryption, hash and HMAC computation, digital signing, key exchange, and pseudorandom number generation." |
236 | VIACK Corporation 16701 NE 80th St., Suite 100 Redmond, WA 98052 USA -Peter Eng
|
Version 3.5 |
Pentium 4.2.60 GHz w/ Windows 2000 Server | 5/10/2004 |
SHA-1     
(BYTE-only) "The VIA3 VkCrypt Cryptographic Module is a software cryptographic module that implements symmetric and public key encryption, digital signatures, and hashing for VIA3 E-meeting products. VIA3 is a secure and confidential E-meeting solution integrating live audio and video, instant messaging, and real-time information sharing." |
235 | Open Source Software Institute Administrative Office P.O. Box 547 Oxford, MS 38655 USA -Ben Laurie
-John Weathersby
|
Version 1.0 |
HP D Class 9000 w/ HP-UX Release B.11.11; Linux Kernel Version: 2.4.21 w/ SuSE Linux 9.0 (x86) | 5/10/2004 |
SHA-1     
(BYTE-only) "The OpenSSL FIPS Cryptographic Module is a validated source code component of the standard OpenSSL distribution that can be downloaded from the http://openssl.org/ website." |
234 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 2.1 |
Intel P4 1.6 GHz w/ Windows 2000 | 5/10/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) "The F-Secure® Cryptographic Library for Windows is a 140-2 Level 2 compliant software module, implemented as a 32-bit Windows compatible DLL. The Module provides an assortment of cryptographic services to client processes that attach instances of the module DLL." |
233 | Advanced Technology Systems 7915 Jones Branch Drive McLean, VA 22102 USA -Martin Gillispie
|
Version 1.0 |
PalmOS 4.1 Palm Tungsten | 5/2/2004 |
SHA-1     
(BYTE-only) "Voyager CryptoModule is a cryptographic engine for securing data transmission on wireless devices." |
232 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Tom Athens
|
Version AAA Part # 1L84000 |
Cygnus X-1 Postal Security Device | 1/25/2005 |
SHA-1     
(BYTE-only) "The Pitney Bowes Cygnus X-1 Postal Security Device (PSD) has been designed in compliance with the United States Postal Service (USPS), Information-Based Indicia Program (IBIP). It employs strong encryption, decryption, and digital signature techniques for the protection of customer funds in Pitney Bowes IBIP Metering products." |
231 | Phoenix Technologies Ltd. 915 Murphy Ranch Road Milpitas, CA 95035 USA -Shiva Mandalam
|
Version 2.01 (Firmware) |
Microsoft Windows XP | 4/27/2004 |
SHA-1     
(BYTE-only) "Phoenix cME TrustConnector is a standard cryptographic service provider that enables built-in device authentication and transparently enhances the way Windows protects identity credentials associated with digital certificates and binds the credentials to the platform to which they are issued." |
230 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA -Juan Asenjo
|
Version 3.41 |
Datacryptor® 2000 hw device w/ Motorola Coldfire processor, part number XCF5206EFT | 4/27/2004 |
SHA-1     
(BYTE-only) "The Datacryptor® 2000 is a standalone multi-chip cryptographic module that secures communications using signed Diffie-Hellman key exchange and Triple-DES or AES encryption over point-to-point links, X.25, Frame Relay, and IP networks. The unit also provides integrated secure unit management capability." |
229 | Bluesocket, Inc. 7 New England Executive Park Burlington, MA 01803 USA -Frank Calabresi
-Mike Puglia
|
Version Broadcom BCM5823 Part # BCM5823KPB |
N/A | 4/19/2004 |
SHA-1     
(BYTE-only) "The Bluesocket Wireless Gateway IPSec implementation performs IPSec security services for the Bluesocket Wireless Gateway." |
228 | Bluesocket, Inc. 7 New England Executive Park Burlington, MA 01803 USA -Frank Calabresi
|
Version OpenSSL Library 0.9.6 (Firmware) |
Pentium IV | 4/16/2004 |
SHA-1     
(BYTE-only) "OpenSSL is an open source toolkit implementing the Transport Layer Security (TLS v1) protocols as well as a full-strength general-purpose cryptography library used to implement TLS for the Bluesocket Wireless Gateway." 11/15/06: Update from SW to FW; |
227 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
-David Finkelstein
|
Version 3.5 |
Pentium IV 1.4 GHz w/ Microsoft Windows XP | 4/13/2004 |
SHA-1     
(BYTE-only) "There are two variants of the Crypto-J module, one which implements an RSA Security-specific API [jsafeFIPS] and the other which implements the Java Cryptographic Extensions (JCE) API [jsafeJCEFIPS]." |
226 | Corrent Corporation 1711 W. Greentree Dr. Suite 201 Tempe, AZ 85284-2717 USA -Richard Andelfinger
|
Part # 220-0001-01 |
N/A | 3/30/2004 |
SHA-1     
(BYTE-only) Does not hash NULL message. "The Corrent CR7120 is industry's first complete full duplex 2.0 Gigabit + IPSec and SSL Security Processor on a chip, for Internet access equipment such as high-speed routers, VPN/Firewalls, Access concentrators, other Internet aggregation devices, layer 4 - 7 security appliances and SAN applications." |
225 | Lucent Technologies, Inc. 600 Mountain Ave. Murray Hill, NJ 07974 USA -Richard T. Fohl
|
Version 2.0 |
Processor: Intel Pentium Xeon 2.4GHz; OS: LVF 7.1.189 | 4/1/2004 |
SHA-1     
(BYTE-only) "Lucent SW Cryptographic Implementation is used in Lucent Bricks. The VPN Firewall Brick is a high-speed packet-processing appliance, oriented towards providing security functions. The Bricks are carrier-grade integrated firewall and virtual private network (VPN) gateway appliance specifically designed for web/application data center security, large-scale managed security services, and remote access VPN services. Called the Brick because of its rugged, reliable design, this is an ideal platform for service providers seeking wide scalability, ready manageability, and industry-leading performance." 3/30/04: Update OS version; |
224 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1.11 |
Intel PXA250 w/ Windows CE 4.20.1081 (Build 13100) | 3/30/2004 |
SHA-1     
(BYTE-only) "The F-Secure and Pointsec Pocket PC Cryptographic Library (the Module) is a software module, implemented as a 32-bit Windows® CE compatible DLL for Windows Mobile 2003 and Pocket PC 2002 platforms." |
223 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.0 |
Atmel AT90SC6464C Secure Microcontroller, Decru SW 2T.4 | 3/23/2004 |
SHA-256 
(BYTE-only) "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for Decru DataFort products. Decru DataFort is a wire-speed storage security appliance. DataFort uses hardware-based encryption, authentication, secure access controls, and secure logging." 06/15/07:Update vendor name and POC; |
222 | SBI Net Systems Co., Ltd Meguro Tokyu Bldg., 5th Floor 2-13-17 Kamiosaki Shinagawa-ku Tokyo, 141-0021 Japan -Hidemitsu Noguchi
|
Version 1.0.0 |
Intel Pentium M w/ Windows XP SP1 and Windows 2000 SP3 | 3/23/2004 |
SHA-1     
(BYTE-only) SHA-256  (BYTE-only) SHA-384  (BYTE-only) SHA-512  (BYTE-only) "C4CS is a software cryptographic module providing symmetric/asymmetric ciphers, hash function, and secret sharing schemes." 08/28/08: Update vendor information; |
221 | Phoenix Technologies Ltd. 915 Murphy Ranch Road Milpitas, CA 95035 USA -Shiva Mandalam
|
Version 3.01 |
Intel Pentium 4 w/ Microsoft Windows XP | 3/17/2004 |
SHA-1     
(BYTE-only) "Phoenix cME TrustConnector is a standard cryptographic service provider that enables built-in device authentication and transparently enhances the way Windows protects identity credentials associated with digital certificates and binds the credentials to the platform to which they are issued." |
220 | iDirect Technologies, Inc. 10803 Parkridge Boulevard Reston, VA 20191 USA -Sasmith Reddi
|
Version 1.0 |
Intel Xeon 2.80GHz and RedHat Linux 7.3 | 3/18/2004 |
SHA-1     
(BYTE-only) "iDirect Technologies' broadband VSAT solutions enable enterprise IT application delivery when performance, bandwidth, and efficient capital costs are required. In a single turnkey solution, enterprises get fast, reliable, cost-effective, broadband IP connections for LAN-to-LAN connectivity and/or direct point-to-point links." |
219 | Secure Systems Limited Level 1, 80 Hasler Road Osborne Park, 6017 Western Australia -Marilyn Windsor
|
Version 1.3.4 |
AMD Athlon 2500+ Windows 2000 | 3/18/2004 |
SHA-1     
(BYTE-only) "The SDV® is a hardware-based security device that resides inside a PC, connected in-line between the host motherboard IDE controller and hard disk drive (HDD). It prohibits unauthorized computer access through strong user authentication while encryption and a sophisticated key management scheme enforce data protection." |
218 | Vormetric, Inc. 3131 Jay Street Santa Clara, CA 95054 USA -Mukesh Nigam
|
Version VN.3.0SP1 |
Linux 7.3, Intel Xeon processor | 3/18/2004 |
SHA-1     
(BYTE-only) "Vormetric CoreGuard is a comprehensive security solution that combines protection of data at rest and host protection. CoreGuard integrates a software module loaded on a server and FIPS compliant appliance with user-defined security policies allowing fine-grain data access control and encryption of stored data." |
217 | Good Technology, Inc. 4250 Burton Drive Santa Clara, CA 95054 USA -Daphne Won
|
Version 1.0 |
Intel Strong ARM w/ Windows CE | 3/18/2004 |
SHA-1     
(BYTE-only) "FIPSCrypto is a software-based algorithm implementation that supports Triple-DES, AES, SHA-1 and HMAC-SHA-1." 08/04/09: Update implementation information; |
216 | Giesecke & Devrient America, Inc. 45925 Horseshoe Drive Dulles, VA 20166 USA -Won J Jun
-Hassan Tavassoli
|
Part # HD65246C1A05NB (Firmware Version:CH463JC_IRNABFOP003901_V101) |
N/A | 3/10/2004 |
SHA-1     
(BYTE-only) "Giesecke & Devrient (G&D) Smart Card Chip Operating System Sm@rtCafé Expert FIPS 64K is a Java Card 2.2 and Open Platform v2.0.1' compliant smart card module. It supports, at a minimum, Triple-DES, AES, DSA, and RSA algorithms with on-card key generation. The Sm@rtCafé Expert FIPS 64K is suitable for government and corporate identification, payment and banking, health care, and Web applications" |
215 | E.F. Johnson 123 N. State Street Waseca, MN 56093 USA -John Oblak
|
Version 2.0 |
Intel Pentium 4 w/ Windows XP SP 1a | 4/16/2004 |
SHA-1     
(BYTE-only) "This algorithm is used in the E.F. Johnson PC Keyloader - Key Encryption Programmer application." |
214 | TeamF1, Inc. 39159 Paseo Padre Parkway #121 Fremont, CA 94538 USA -Mukesh Lulla
|
Version 2.0 |
pSOSystem on X86 family CPU | 3/4/2004 |
SHA-1     
(BYTE-only) "TeamF1's Krypto-Lite Is a FIPS 140-2 compliant, standards-based flexible, high performance and modular software cryptographic algorithms library. It is available in "C" source code form and tailored for embedded use and for hardware acceleration. It includes symmetric and asymmetric ciphers as well as crypto hash algorithms with an interface that can be used with any network security application." |
213 | Fortinet Inc. 920 Stewart Drive Sunnyvale, CA 94085 USA -Alan Kaye
|
Version 1.0 |
FortiOS ASIC Running FortiOS V2.5 | 3/4/2004 |
SHA-1     
(BYTE-only) "The FortiGate modules are multiple chip, standalone cryptographic modules consisting of production grade components contained in a physically protected enclosure in accordance with FIPS 140-2 Level 2 requirements." |
212 | Nokia 313 Fairchild Drive Mt View, CA 94043 USA -Robert Kusters
|
Version 3.7 |
Intel Pentium 3 w/Nokia IPSO-SB | 2/18/2004 |
SHA-1     
(BYTE-only) "The Nokia IP350 and IP380 are full-featured enterprise systems designed for small to medium enterprises, with Service Provider flexibility and rapid serviceability option in a single rack space. When combined with Check Point VPN-1/FW-1, these platforms provide reliable, easy to manage distributed security and access." |
211 | Nokia 313 Fairchild Drive Mt View, CA 94043 USA -Robert Kusters
|
Part # NIF4214000/NIF4214FRU |
N/A | 2/18/2004 |
SHA-1     
(BYTE-only) The SHA-1 implementation for this module does not support hashing of message lengths equal to 0 "The Nokia IP350 and IP380 are full-featured enterprise systems designed for small to medium enterprises, with Service Provider flexibility and rapid serviceability option in a single rack space. When combined with Check Point VPN-1/FW-1, these platforms provide reliable, easy to manage distributed security and access." |
210 | Nokia 313 Fairchild Drive Mt View, CA 94043 USA -Robert Kusters
|
Part # NBB3350000 |
N/A | 2/18/2004 |
SHA-1     
(BYTE-only) The SHA-1 implementation for this module does not support hashing of message lengths equal to 0 "The Nokia IP350 and IP380 are full-featured enterprise systems designed for small to medium enterprises, with Service Provider flexibility and rapid serviceability option in a single rack space. When combined with Check Point VPN-1/FW-1, these platforms provide reliable, easy to manage distributed security and access." |
209 | Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Christophe Goyet
|
Version 0xE302 (Firmware) |
JMX64 | 2/4/2004 |
SHA-1     
(BYTE-only) "The Oberthur Card Systems CosmopolIC 72K RSA Java Card Platform is a single chip cryptographic micro-processor smart card specifically designed for identity and government market needs, with a large memory (72KB), a highly secure architecture and several services and default applications in ROM for ISO 7816 File System, Biometry and Authentication." |
208 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 2.0 (Firmware) |
SonicOS v2.0 | 2/4/2004 |
SHA-1     
(BYTE-only) "The PRO 4060 and PRO 3060 are internet security appliances offering stateful packet inspection firewall services, accelerated IPSec VPN, bandwidth management, and dual-WAN port support with ISP failover and load-balancing capabilities, all via six configurable 10/100 Ethernet interfaces." 04/27/07: Update vendor POC info; |
207 | Analytical Logic cc 2 Lozenge Place Jukskei Park Johannesburg, 2153 South Africa -Andrew Morgan
|
Version 1.0 |
Intel P3 Processor w/ Windows 2000 SP4 | 2/4/2004 |
SHA-1     
(BIT) "Enigmatic is a little endian cryptographic class library developed in C++. TSHA is one of a family of classes that derive from the abstract THash. TSHA uses 64-bit message management enabling it to operate reliably and efficiently on very large messages (>> 2**32 bits). It is a bit-level implementation and uses auto-sensing logic to handle message padding, termination and over-runs." |
206 | Credant Technologies Corporation 15303 N Dallas Parkway, Suite 1420 Addison, TX 75001 USA -Chris Burchett
|
Version 1.0 |
Intel Pentium III w/ Win 2000 | 2/4/2004 |
SHA-1     
(BYTE-only) "CREDANT Cryptographic Kernel is a FIPs-140-2 compliant, software-based cryptography library that implements 3DES, AES and SHA-1 algorithms for the CREDANT Mobile Guardian product. CREDANT Mobile Guardian enables enterprise-wide control of security for mobile and wireless users of laptops, tablet PCs & PDAs." |
205 | Britestream Networks, Inc 12401 Research Blvd. Bldg 2, Suite 275 Austin, TX 78759 -Rick Hall
|
Part # A1 |
N/A | 1/14/2004 |
SHA-1     
(BYTE-only) ""The UltraLock™ Cryptographic Module performs all the cryptography required for SSL/TLS applications. This module is a common element of the BN2010 and BN2025 UltraLock Security Processors, the industry's first single-chip solutions for completely off-loading SSL/TLS processing from host systems. The innovative in-line architecture combines TCP/IP termination and high-speed cryptography to transparently process SSL/TLS traffic at wire speed without impacting host system performance. Industry-standard GMII Ethernet connectivity allows UltraLock processors to drop easily into common networking and security platforms without special software development or complex hardware redesign, greatly reducing time to market."" 11/16/04: Update vendor POC info and description; |
204 | Atmel Corporation 1150 E. Cheyenne Mountain Blvd Colorado Springs, CO 80906 USA |
Part # AT57813-0AQT |
N/A | 12/18/2003 |
SHA-1     
(BYTE-only) |
203 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Tom Gilbert
|
Part # BG4000 |
N/A | 12/18/2003 |
SHA-1     
(BYTE-only) "The BG4000 and BG3140 are network security appliances for the construction of secure Virtual Private Networks between Internet sites, and between Internet sites and individual remote users." |
202 | PalmSource, Inc. 1240 Crossman Drive Sunnyvale, CA 94089 USA -Richard Levenberg
|
Version 5.2.2 |
Palm OS(r) software v. 5.2.1 | 12/8/2003 |
SHA-1     
(BYTE-only) "The CPM provides robust cryptographic functionality through a simple API that developers can use with very little cryptographic expertise. The FIPS certified algorithms, available through the CPM, include 3DES, AES and SHA1. SHA2, RC4, and RSA public operations are also supported." |
201 | Chunghwa Telecom Co., Ltd. Telecommunication Laboratories 12, Lane 551, Min-Tsu Road SEC.5 Yang-Mei, Taoyuan, Taiwan 326 Taiwan, ROC -Yu-Ling Cheng
|
Version 1.0 (Firmware) |
ARM 7 Processor running PSOS | 12/8/2003 |
SHA-1     
(BYTE-only) "SafGuard200 is a multi-chip standalone cryptographic module that is used to provide highly-secure cryptographic services and key storage for PKI applications. (e.g., secure private key storage, high-speed math accelerator for 1024-4096 bit public key signatures, and hashing). The SafGuard 200 HSM provides secure identity-based challenge-response authentication using smart cards and data encryption using FIPS approved 3DES and AES encryption." |
200 | Good Technology, Inc. 4250 Burton Drive Santa Clara, CA 95054 USA -Daphne Won
|
Version 20031028 |
ARM-based processor w/ Palm 5 | 11/7/2003 |
SHA-1     
(BYTE-only) "The GoodFipsCrypto.prc is a FIPS 140-2 compliant software-based cryptographic module that implements the TDES, AES, SHA-1 and HMAC-SHA-1 algorithms." |
199 | Enterasys Networks 50 Minuteman Road Andover, MA 01810 USA -Damon Hopley
|
Part # SafeNet 1140; HW: Version 1.0 |
N/A | 11/7/2003 |
SHA-1     
(BYTE-only) The SHA-1 implementation for this module does not support hashing of message lengths equal to 0 or greater than 1500 bytes "Hardware cryptographic algorithm implementations for the XSR product line." |
198 | Enterasys Networks 50 Minuteman Road Andover, MA 01810 USA -Damon Hopley
|
Version 1.0 |
200MHz IBM PowerPC 405 GP w/ VxWorks | 11/7/2003 |
SHA-1     
(BYTE-only) "Software cryptographic algorithm implementations for the XSR product line." |
197 | Enterasys Networks 50 Minuteman Road Andover, MA 01810 USA -Damon Hopley
|
Version 1.0 |
200MHz IBM PowerPC 405 GP w/ VxWorks | 11/7/2003 |
SHA-1     
(BYTE-only) "Software cryptographic algorithm implementations for the XSR product line." |
196 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Mike Scruggs
|
Version P/N Nitrox Lite Die Part # Version 1.2 |
N/A | 11/7/2003 |
SHA-1     
(BYTE-only) "NITROX Lite is a series of single and multi-core hardware macro-processors, implemented with a common processor core architecture. Each identical processor core implements several security and math algorithms, including ModEx, RSA, 3DES, AES256, SHA1, MD5, and HMAC. Nitrox Lite series part numbers include CN1010, CN1005, CN1001, CN505, and CN501. The family's performance ranges from 50Mbs to 1 Gbps of encryption bandwidth, and from 1K to 7K RSA/DH operations per second. NITROX Lite processors and acceleration boards are used in a wide range of equipment, and accelerate many security protocols and algorithms including IPSec, SSL, XML, and WLAN." 01/09/08: Update vendor POC, implementation name, OE, part number, and description; |
195 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 1.0 |
Pentium 4 w/ Windows 2000 SP3 | 11/13/2003 |
SHA-1     
(BYTE-only) "BlackBerry is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry" |
194 | IBM Corporation 2455 South Road Poughkeepsie, NY 12601 USA -Barry Ward
|
Version 1.0 (Firmware) |
x86 Linux | 10/23/2003 |
SHA-1     
(BYTE-only) "The IBM eServer Cryptographic Coprocessor is a state-of-the-art, tamper-sensing and responding, programmable PCI-X card. Cryptographic electronics and a full microprocessor system, housed within a tamper-responding environment, provide a highly secure subsystem in which data processing and cryptography can be performed." |
193 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Part # 7956; Version 1.0 |
N/A | 10/20/2003 |
SHA-1     
(BYTE-only) "The Hifn 7955 and 7956 are advanced security processors designed for high-speed T3/OC3, ROBO/SME networking applications like VPN Broadband Routers, wireless access points, VPN Edge Routers/Gateways, Firewall/VPN Appliances and other Network and Customer Premise Equipment (CPE)." |
192 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.0 |
Atmel AT90SC6464C Secure Micro | 10/10/2003 |
SHA-1     
(BYTE-only) "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for Decru DataFort products. Decru DataFort is a wire-speed storage security appliance. DataFort uses hardware-based encryption, authentication, secure access controls, and secure logging to protect networked storage in NAS, SAN, DAS, and Tape environments. DataFort can be deployed transparently, with no changes to desktops, servers, applications, or user workflow." 06/15/07:Update vendor name and POC; |
191 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.0 (Firmware) |
Decru SAN SEP | 10/10/2003 |
SHA-1     
(BYTE-only) Does not hash Null message. "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for Decru DataFort products. Decru DataFort is a wire-speed storage security appliance. DataFort uses hardware-based encryption, authentication, secure access controls, and secure logging to protect networked storage in NAS, SAN, DAS, and Tape environments. DataFort can be deployed transparently, with no changes to desktops, servers, applications, or user workflow." 06/15/07:Update vendor name and POC; |
190 | NetApp, Inc. 495 East Java Drive Fourth Floor Sunnyvale, CA 94089 USA -Ajay Singh
|
Version 1.0 (Firmware) |
Decru NAS SEP | 10/10/2003 |
SHA-1     
(BYTE-only) Does not hash Null message. "Decru's Storage Encryption Processor (SEP) is the primary cryptographic and key management engine for Decru DataFort products. Decru DataFort is a wire-speed storage security appliance. DataFort uses hardware-based encryption, authentication, secure access controls, and secure logging to protect networked storage in NAS, SAN, DAS, and Tape environments. DataFort can be deployed transparently, with no changes to desktops, servers, applications, or user workflow." 06/15/07:Update vendor name and POC; |
189 | 3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064 USA -Victoria Van Spyk
|
Part # 40-0728-001 |
N/A | 10/10/2003 |
SHA-1     
(BYTE-only) Tested for hash messages greater than 3 bytes in length and less than 1514 bytes in length. "3Com's IPSec Offload Integrated Circuit is hardware based crypto device that performs IPSec (DES, TDES, SHA-1, MD5 and HMAC) computations on 3Com's series of Secure Network Interface Cards and Embedded Firewall products." |
188 | 3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064 USA -Victoria Van Spyk
|
Version 03.001.007, 03.101.015 (Firmware) |
3Com's 10/100 Mbps Secure Network Interface Card (NIC) w/ ARM9 processor w/ Windows 2000 | 10/10/2003 |
SHA-1     
(BYTE-only) Tested for hash messages less than 1514 bytes in length. "3Com’s SHA-1 and HMAC SHA-1 software module computes SHA-1 and HMAC SHA-1 digest for a given vector. The module allows authentication and certification of 3Com’s software products." |
187 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Joel Rieger
|
Part # 1.1 |
N/A | 9/30/2003 |
SHA-1     
(BYTE-only) "The SafeXcel 1141/1741 ASICs are part of the SafeNet IPsec co-processor chip family. The devices consist of an IPsec Packet Engine that performs DES, TDES, AES, SHA-1, MD5, header/trailer and insertion/deletion operations, a Public Key Accelerator that performs RSA, DSA, and DH operations using long vector math up to 2048 bits, and a Random Number Generator that provides up to 2 Mbps of random data." |
186 | ITServ Inc. 6 Montgomery Village Ave., Suite 405 Gaithersburg, MD 20879 USA -Faydeana Huang
|
Version 5.0 |
Linux 2.2.17-21 w/ Transmeta Crusoe TM5400 (Intel x86-based) | 9/30/2003 |
SHA-1     
(BYTE-only) "RideWay Station FGC is an integrated firewall, VPN and wireless gateway appliance for small to medium-sized organizations. Computers and servers (wired and/or wireless) in your networks will be protected from unauthorized accesses and attacks from the Internet. In addition, IPSec VPN (using 3DES encryption) enables workers in remote locations to securely access internal network resources. VPN can also be used to create a secure connection between two branch offices." |
185 | Good Technology, Inc. 4250 Burton Drive Santa Clara, CA 95054 USA -Daphne Won
|
Version 1.9.3.7 |
ARM-based processor w/ eCos 1.3.1 | 9/30/2003 |
SHA-1     
(BYTE-only) "The FipsCrypto is a FIPS 140-2 compliant software-based cryptographic dll module that implements the 3DES, AES, SHA-1 and HMAC-SHA-1 algorithms." |
184 | Backbone Security.com 701 Main Street, Suite 300 Stroudsburg, PA 18360 USA - Marc Kurtz
|
Version 2.2 FIPS |
Linux kernel w/ Intel P3 (proprietary non-modifiable) | 9/22/2003 |
SHA-1     
(BYTE-only) "Ribcage is a secure IPSec Virtual Private Network that provides secure connectivity deployed on a shared infrastructure with the same privacy and performance as a leased network. Ribcage is a solution that is flexible as both a secure virtual private network and as a remote access device." |
183 | PGP Corporation 200 Jefferson Dr. Menlo Park, CA 94025 USA -Vinnie Moscaritolo
|
Version 3.0.3 |
Sony Notebook Computer PCG-8C6L, MS Win XP ProfessionalSP-1 | 9/22/2003 |
SHA-1     
(BYTE-only) "The PGP SDK includes a wide range of field-tested and standards-based encryption, digital signature, and encoding algorithms as well as a variety of secure network protocol implementations. The PGP SDK offers developers the same core crypto that is at the heart of PGP products." 03/11/08: Update vendor contact information; |
182 | IDT 2975 Stender Way Santa Clara, CA 95054 USA -Alex Soohoo
|
Part # ZA |
N/A | 9/17/2003 |
SHA-1     
(BYTE-only) "The Interprise Access RC32365 is an integrated communications processor that addresses the secure SOHO wired/wireless gateway and VPN/firewall appliance markets by incorporating a high-performance CPU, an on-chip security engine and key peripheral interfaces." |
181 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.2.3790.0 |
AMD Athlon 900Mhz w/ Windows 2003 | 9/2/2003 |
SHA-1     
(BYTE-only) "The Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider is a FIPS 140-2 compliant, software-based, cryptographic module.RSAENH encapsulates several different cryptographic algorithms (including SHA-1, DES, 3DES, DSA, SHA-1-based HMAC) in a cryptographic module accessible via the Microsoft CryptoAPI." |
180 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA - Mike Scruggs
|
Version NITROX II (Firmware) Part # CN2130 |
CN2130 and Cavium Microcode | 8/27/2003 |
SHA-1     
(BYTE-only) "NITROX II In-Line Security Processors Product Description: The NITROX II CN2130 is one member of the Cavium Networks award winning NITROX, NITROX Lite, and NITROX II line of security processors. Based on a common hardware processor core, the NITROX families deliver 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs in a wide range of networking equipment to accelerate security protocols and algorithms." |
179 | Cavium Networks 805 E. Middlefield Road Mountain View, CA 94043 USA -Mike Scruggs
|
Version CN1000-MC-CryptoModule-1.1(Firmware) Part # NITROX CN1120 |
NITROX CN1120 and associated firmware (microcode) | 8/27/2003 |
SHA-1     
(BYTE-only) "NITROX Security Macro Processor Product Description: The NITROX CN1120 is one member of the NITROX line of award winning security processors from Cavium Networks. Based on a common core hardware processor architecture, the NITROX family delivers 50Mbs to 10Gbps of encryption bandwidth with 1K to 40K RSA/DH operations per second. NITROX processors and acceleration boards are being used by server-motherboard vendors and OEMs, in a wide range of equipment, to accelerate security protocols and algorithms." |
178 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 2.1 |
Intel P4 1.6 GHz w/ Windows 2000s | 8/27/2003 |
SHA-1     
(BYTE-only) "The F-Secure Cryptographic Library for Windows is a 140-2 Level 2 compliant software module, implemented as a 32-bit Windows compatible DLL. The module provies an assortment of cryptographic services to client processes that attach instances of the module DLL." |
177 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.2.3790.0 |
Athlon 800 Mhz w/ Windows 2003 .Net Server | 8/19/2003 |
SHA-1     
(BYTE-only) "Kernel level .sys module exporting cryptographic functionality." |
176 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA -Mike Lai
|
Version 5.2.3790.0 |
Athlon 800 Mhz w/ Windows 2003 .Net Server | 8/14/2003 |
SHA-1     
(BYTE-only) "The Microsoft Enhanced Cryptographic Provider is a FIPS 140-2 compliant, software-based, cryptographic module.RSAENH encapsulates several different cryptographic algorithms (including SHA-1, DES, 3DES, AES, RSA, SHA-1-based HMAC) in a cryptographic module accessible via the Microsoft CryptoAPI." |
175 | Airespace Inc. 110 Nortech Pkwy San Jose, CA 95134 USA -Scott Kelly
|
Version 1.3 Part # 35-100680-000 (R1) |
Airespace 4000 Series | 7/29/2003 |
SHA-1     
(BYTE-only) "Airespace IPSec Crypto Module provides cryptographic services for the Airespace Wireless Enterprise Platform. Airespace offers a unique hierarchical architecture that centralizes network intelligence for cost effective deployment, dynamic RF operations, secure mobility management, service creation, and policy enforcement throughout an entire wireless network." |
174 | Airespace Inc. 110 Nortech Pkwy San Jose, CA 95134 USA -Scott Kelly
|
Version 1.3 Part # 35-100681-000 (R1) |
Airespace 4000 Series | 7/29/2003 |
SHA-1     
(BYTE-only) "Airespace SSL Crypto Module provides cryptographic services for the Airespace Wireless Enterprise Platform. Airespace offers a unique hierarchical architecture that centralizes network intelligence for cost effective deployment, dynamic RF operations, secure mobility management, service creation, and policy enforcement throughout an entire wireless network." |
173 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Part # M516LACC2 Hardmask 1V1 Softmask 2V1 |
JavaCard 2.1.1 Runtime Environment | 7/14/2003 |
SHA-1     
(BYTE-only) "The Cyberflex Access 64K V2 smart card can be employed in solutions which provide secure PKI (public key infrastructure) and digital signature technology. Cyberflex Access 64K V2 serves as a highly portable, secure token for enhancing the security network access and ensuring secure electronic communications." 08/27/04: Update vendor address; |
172 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Javier Lorenzo
-Irfan Khan
|
Version 1.0 (Hardware) Part # X4011A Sun Crypto Accelerator 4000 - Copper |
N/A | 6/20/2003 |
SHA-1     
(BYTE-only) "Cryptographic Acceleration Card" |
171 | Sun Microsystems 4150 Network Circle Santa Clara, CA 95054 USA -Javier Lorenzo
-Irfan Khan
|
Version 1.0 (Firmware) Part # X4011A Sun Crypto Accelerator 4000 - Copper |
Solaris 8 7/01 SSL, 9 IPSec; Sun UltraSparc | 6/25/2003 |
SHA-1     
(BYTE-only) "Cryptographic Acceleration Card" |
170 | IBM 11400 Burnet Rd Austin, TX 78758 USA -Tom Benjamin
|
Version 1.0 |
PowerPC Power3 processor w/ AIX 5.2 | 6/19/2003 |
SHA-1     
(BYTE-only) "The IBM® Java® JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for Multi-platforms is a scalable, multi-purpose cryptographic module that supports only FIPS approved cryptographic operations via the Java2 Application Programming Interfaces (APIs)." |
169 | Bluesocket, Inc. 7 New England Executive Park Burlington, MA 01803 USA -Mike Puglia
|
Version AdmitOne Library 3 |
Pentium IV w/ Linux Kernel 2.4.18 | 6/10/2003 |
SHA-1     
(BYTE-only) "The Bluesocket Wireless Gateway IPSec implementation performs IPSec security services for the Bluesocket Wireless Gateway." 8/10/04: Update impl name, and type; |
168 | ECI Systems and Engineering 3100 Knight Street, Suite 7 Shreveport, Louisiana 71105 USA -Chris Farmer
|
Version 1.6 |
Pentium 4 2Ghz - Solaris 2.8 | 6/10/2003 |
SHA-1     
(BYTE-only) "A software IPSec implementation for Sun Trusted Solaris. This module supports Triple DES encryption/decryption, SHA-1, and HMAC-SHA-1." |
167 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Part # DS1955B PB0 1.00c |
N/A | 6/6/2003 |
SHA-1     
(BYTE-only) "The Pitney Bowes iButton Postal Security Device (PSD) has been designed in compliance with the United States Postal Service (USPS), Information-Based Indicia Program (IBIP). It employs strong encryption, decryption, and digital signature techniques for the protection of customer funds and the production of postage meter indicia in a variety of Pitney Bowes Metering products. The PSD has been designed to support international postal markets and their evolving requirements for digital indicia." |
166 | Martsoft 2902 Corvin Dr. Santa Clara, CA 95051 USA -Paul Chen
|
Version V1 |
Atmel AT90SC6464C; MartSoft GlobalPlatform JavaCard OS 0910 | 5/7/2003 |
SHA-1     
(BYTE-only) "EagleCard v1 cryptographic module is a combination of the "Atmel Smart Card IC" and "Martsoft GlobalPlatform JavaCard OS". The module contains a microprocessor, a crypto co-processor, EEPROM and FLASH memory to provide processing capability and memory for storing programs and data." |
165 | E.F. Johnson 123 N. State Street Waseca, MN 56093 USA -John Oblak
|
Version 1.0 |
EF Johnson Portable Radios | 5/7/2003 |
SHA-1     
(BYTE-only) "The Subscriber Encryption Module (SEM) is a cryptographic module which supports the AES, DES, DSA, and SHA-1 algorithms. The SEM is used in subscriber equipment such as the E.F. Johnson radios to provide secure, encrypted voice and data communication." |
164 | Trust Digital 7900 Westpark Drive, Suite A50 McLean, VA 22102 USA -Mike Shahbazi
|
Version 3.0 |
Pentium 3 w/ Windows 2000 | 4/24/2003 |
SHA-1     
(BYTE-only) "Award winning Trusted Mobility Server allows an organization to centrally manage an unlimited number of PDA handheld or wireless devices. Access control, encryption, Data Wipe and many more device functionality can all be set and pushed to the device. A complete audit trail of device usage is also recorded. Trust Digital offers security for Palm, Pocket PC, Blackberry (RIM), Symbian and all windows operating systems." |
163 | IBM Zurich Research Laboratory Saeumerstrasse 4 Rueschlikon, CH 8803 Switzerland -Michael Osborne
|
Version 3.0 (FIPS140/Prod) |
Pentium III w/ Windows 2000 Professional | 4/18/2003 |
SHA-1     
(BYTE-only) "IBM CryptoLite is a C software package providing advanced Cryptographic services in a very small footprint. CryptoLite supports public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms through a simple programming interface. There are no runtime dependencies and the code has been optimized for high performance." |
162 | SPYRUS, Inc. 2355 Oakland Road, Suite 1 San Jose, CA 95131 USA -Tom Dickens
|
Version 4.02.00.04 |
PC Platform with Microsoft Windows 2000 | 4/11/2003 |
SHA-1     
(BYTE-only) "The Rosetta CSI sToken is a software cryptographic token providing digital signature and encryption services in a PC environment. The Rosetta sToken provides for ease of use, deployment, and the assurance provided through independent third party security validation." |
161 | Nauticus Networks 200 Crossing Boulevard Framingham, MA 01702 USA -Matt Rollender, Director of Marketing
|
Version 1.0 |
PowerPC 440 w/ OSE 4.4.1 | 4/7/2003 |
SHA-1     
(BYTE-only) "Nauticus Networks N2040 and N2120 are purpose built application switches that enable cost effective, reliable, deployment of intergrated network and security services, delivering gigabit scaled Layer 5-7 application switching, Layer 4 load balancing, and SSL acceleration to the most demanding enterprise and service provider environments." |
160 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version Rev 1.0 Part # 8154PB5 |
N/A | 3/21/2003 |
SHA-1     
(BYTE-only) "Hifn Intelligent Packet Processing chips are full-duplex T3 to full-duplex OC-12, Integrated public key, 3DES, Advanced Encryption Standard (AES), and compression - these latest chips from Hifn have it all in a single high-performance package." |
159 | IBM Corporation 3901 S. Miami Blvd. Durham, NC 27703 USA |
Version 0.1 |
AMD Athlon 900 Mhz processor w/ Windows 2000 Professional | 3/20/2003 |
SHA-1     
(BYTE-only) "The ICC is a C language implementation of cryptographic functions which uses the cryptograhic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certificate cryptographic provider." |
158 | Francotyp-Postalia AG & Co. Triftweg 21-26 Birkenwerder, D-16547 Germany -Dirk Rosenau
|
Version 1.0 |
Pentium 4 w/ Windows 2000 | 3/10/2003 |
SHA-1     
(BYTE-only) "Revenector is an embedded security device that can enhance the security of various kinds of appliances and computerized devices. This version of SHA-1 is used to hash application specific software to be downloaded into the device" |
157 | ReefEdge, Inc. 2 Executive Dr. Fort Lee, NJ 07024 USA -Silvia Ercolani
|
Version 3.1 |
Intel Celeron w/ Linux kernel (proprietary non-modifiable) | 3/6/2003 |
SHA-1     
(BYTE-only) "The ReefEdge family of Edge Controllers provides perimeter security and high-speed subnet roaming to the ReefEdge Connect System, connecting an enterprise's access points to its wired LAN." |
156 | ReefEdge, Inc. 2 Executive Dr. Fort Lee, NJ 07024 USA -Silvia Ercolani
|
Version 3.1 |
Intel Celeron w/ Linux kernel (proprietary non-modifiable) | 3/6/2003 |
SHA-1     
(BYTE-only) "The ReefEdge family of Edge Controllers provides perimeter security and high-speed subnet roaming to the ReefEdge Connect System, connecting an enterprise's access points to its wired LAN." |
155 | ReefEdge, Inc. 2 Executive Dr. Fort Lee, NJ 07024 USA -Ms. Silvia Ercolani
|
Part # Version 3.0 |
N/A | 3/6/2003 |
SHA-1     
(BYTE-only) "The ReefEdge family of Edge Controllers provides perimeter security and high-speed subnet roaming to the ReefEdge Connect System, connecting an enterprise's access points to its wired LAN." |
154 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Lakshmi Kethana
|
Version 9.0.4 |
Sun Solaris 8.0 on Dual UltraSPARC 64-bit 300MHz CPU | 3/6/2003 |
SHA-1     
(BYTE-only) "The Cryptographic Library for SSL is a generic module used in a variety of Oracle application suites. It provides support for cryptography, authentication, PKCS and certificate management for applications like the Oracle database (Server & Client), Oracle Applications Server, Oracle Internet Directory, Web Cache and Apache." |
153 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 3.6.3B |
Pentium IV w/ Windows 2000 SP2 | 2/20/2003 |
SHA-1     
(BYTE-only) "The Cisco VPN Client enables you to establish secure, end-to-end encrypted tunnels. The client can be pre-configured for mass deployments and initial logins require very little user intervention. VPN access policies and configurations are downloaded from the central gateway and pushed to the client when a connection is established, allowing simple deployment and management, as well as high scalability." |
152 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 3.6 |
Motorola PPC740, VPN3015, pSOS+ | 2/13/2003 |
SHA-1     
(BYTE-only) "The Cisco VPN 3000 Concentrator Series is a best-of-breed, remote-access VPN solution for enterprise-class deployment. The validation includes hardware models 3005, 3015, 3030, 3060, 3080 and the 3002 hardware client." |
151 | Colubris Networks Inc. 420 Armand-Frappier (suite 200) Laval, Quebec H7V 4B4 Canada -Stéphane Laroche
|
Version 1.0 |
Motorola MPC855T PowerQUICC | 2/13/2003 |
SHA-1     
(BYTE-only) "Colubris CN105x Secure Wireless LAN Router enables strong security for wireless enterprise networking, using embedded IPSec VPN and firewall functionalities. fipscrypto is the kernel mode implementation in the CN1050 and CN1054 Wireless LAN Routers" |
150 | Colubris Networks Inc. 420 Armand-Frappier (suite 200) Laval, Quebec H7V 4B4 Canada -Stéphane Laroche
|
Part # Hifn 7901 |
N/A | 2/13/2003 |
SHA-1     
(BYTE-only) Maximum message size: 2000 bytes "Colubris CN105x Secure Wireless LAN Router enables strong security for wireless enterprise networking, using embedded IPSec VPN and firewall functionalities. Hifn 7901 is the cryptographic processor used in the CN1050 and CN1054 Wireless LAN Routers" |
149 | Colubris Networks Inc. 420 Armand-Frappier (suite 200) Laval, Quebec H7V 4B4 Canada -Stéphane Laroche
|
Version 1.0 |
Motorola MPC855T PowerQUICC | 2/13/2003 |
SHA-1     
(BYTE-only) "Colubris CN105x Secure Wireless LAN Router enables strong security for wireless enterprise networking, using embedded IPSec VPN and firewall functionalities. Lipfips is the User mode implementation in the CN1050 and CN1054 Wireless LAN Routers." |
148 | IBM Zurich Research Laboratory Saeumerstrasse 4 Rueschlikon, CH 8803 Switzerland -Michael Osborne
|
Version 3.0 (FIPS140/Prod) |
Pentium III w/ Windows 2000 | 1/30/2003 |
SHA-1     
(BYTE-only) "IBM CryptoLite is a 100% Java software package providing advanced cryptographic services in a very small footprint. CryptoLite supports public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms through a simple programming interface. There are no runtime dependencies and the code has been optimized for high performance. It runs on JDK 1.1 or higher." |
147 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 3.3 |
BlackBerry OS Version 3.3 w/ ARM 7 | 1/30/2003 |
SHA-1     
(BYTE-only) "BlackBerry™ is the leading wireless enterprise solution that allows users to stay connected with secure, wireless access to email, corporate data, phone, web and organizer features. BlackBerry™ is a totally integrated package that includes hardware, software and service, providing a complete end-to-end solution. The BlackBerry™ Cryptographic Kernel is the software module that provides the basic cryptographic functionality for the BlackBerry™." |
146 | SonicWALL, Inc. 1143 Borregas Ave. Sunnyvale, CA 94089-1306 USA -Usha Sanagala
|
Version 4.1 (firmware) |
MaxOS v4.1 | 1/30/2003 |
SHA-1     
(BYTE-only) "The SCA2/SSL-RX is an SSL proxy device designed for SSL acceleration and offloading. The SCA2/SSL-RX provides the ability to both terminate and initiate SSL connections, converting cipher-text to clear-text, or clear-text to cipher-text." 04/27/07: Update vendor POC info; |
145 | SSH Communications Security Corp Fredrikinkatu 42 Helsinki, 00100 Finland -Markus Levlin
|
Version 1.0 |
Pentium III w/ Redhat Linux 7.3 | 1/30/2003 |
SHA-1     
(BYTE-only) "The SSH Cryptographic Library is a standards-based shared library providing FIPS 140-2 certified cryptographic services for SSH Communications Security's security products. The library provides a rich API and a comprehensive set of state-of-the-art algorithms including AES, 3DES, SHA-1, HMAC, RSA and DSA." |
144 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 1.0 Part # 7814 |
N/A | 1/17/2003 |
SHA-1     
(BYTE-only) "Hifn Intelligent Packet Processing chips are full-duplex T3 to full-duplex OC-12, Integrated public key, 3DES, Advanced Encryption Standard (AES), and compression - these latest chips from Hifn have it all in a single high-performance package." 11/22/05: Update impl name; |
143 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 3.0 Part # 7854PB4 |
N/A | 1/17/2003 |
SHA-1     
(BYTE-only) "Hifn Intelligent Packet Processing chips are full-duplex T3 to full-duplex OC-12, Integrated public key, 3DES, Advanced Encryption Standard (AES), and compression - these latest chips from Hifn have it all in a single high-performance package." 2/15/05: Update impl name, part number, and vendor POC info; |
142 | Ultra Information Systems, Inc. 13130 Roundup Avenue San Diego, CA 92129 USA -Dr. Lynn Spraggs
|
Version 1.0.0 |
Pentium III w/ Windows 2000 | 1/17/2003 |
SHA-1     
(BYTE-only) "The UIS Anonymous Key Technology Skyhook Security Suite is a Java software package with an API interface for performing cryptographic operations and at the same time for performing personal authentication. The module is based on symmetric AES encryption and the UIS AKT methodology." |
141 | Encotone Ltd. P.O.B. 45094-91450 Jerusalem - Israel, Jerusalem - Israel -Isaac Labaton
|
Version 6.2 |
N/A | 12/19/2002 |
SHA-1     
(BYTE-only) Hashes bit strings lengths 0-440 and 760 "The Tele-ID is a portable, phone and PC compatible signature tool able to digitally sign messages, either locally entered on the module or whose Hash value has been transmitted to the module. The digital signature is encoded to sound and, hence, can be sent through any phone, cellular or fixed, or any PC microphone. The Tele-ID has capabilities to create an ECDSA k-163 key pair and enroll the public key with most of the PKI vendors RA-CA. The Tele-ID includes an autarkic GMT Time Stamp in each digital signature to enable CRL/OCSP on-line checking, after signature execution time-stamp corroboration, and with it, to strongly enhance the legal defense of the relying party." |
140 | 3e Technologies International, Inc. 700 King Farm Blvd, Suite 600 Rockville, MD 20850 USA -Ryon Coleman
|
Version 1 |
National Geode GX1 Processor w/ Linux 2.4.18 Kernel | 12/16/2002 |
SHA-1     
(BYTE-only) "Advanced Encryption for Secure Wireless Networking" |
139 | D'Crypt Pte Ltd 20 Ayer Rajah Crescent #08-08 Technopreneur Centre Singapore, 139964 Singapore -Quek Gim Chye
|
Version 2.0 |
D'Crypt Secure Micro O/S v3.0 | 12/12/2002 |
SHA-1     
(BYTE-only) "The d'Cryptor QE is a multi-chip embedded security module designed for high security assurance applications. It comprises a secure high-performance cryptographic core, generous memory in the form of a Flash ROM and NVRAM, and implements physical security through an opaque, hard epoxy potting and a tamper detection and response mesh. The QE firmware builds in a wide range of cryptographic support and accepts a user-programmable external application. Cryptographic services are provided through a library and an API. All keys and cryptographic processing are isolated within this library and accessible only through the API." |
138 | Phaos Technology Corporation 11 Broadway, Suite 501 New York, NY 10004 USA -Darren Calman
|
Version 3.0 |
Pentium III w/ Windows 2000 | 12/3/2002 |
SHA-1     
(BYTE-only) "Phaos Crypto provides a state-of-the-art set of core cryptography algorithms in Java. It includes a comprehensive cryptographic library supporting the most current algorithms like AES, RSA-OAEP, SHA-256/384/512, X.9-42 as well as legacy algorithms that are still used in corporate systems like 3DES, DES, MD2 etc.. Phaos Crypto allows developers to integrate cryptography into any Java application or applet. For high security deployments, Phaos Crypto provides transparent migration to cryptographic hardware without requiring any changes to existing applications." |
137 | Giesecke & Devrient America, Inc. 45925 Horseshoe Drive Dulles, VA 20166 USA -Won J. Jun
|
Part # CP5WxSPKI24-01-3-S V0310 |
N/A | 12/2/2002 |
SHA-1     
(BYTE-only) "Giesecke & Devrient (G&D) Smart Card Chip Operating System Standard Version with Public Key Extension 2.4 (STARCOS SPK 2.4) is a scaleable multi-application operating system for smart cards and provides functionalities that are necessary for public key infrastructure." |
136 | United States Postal Service Address Management 6060 Primacy Pkwy, STE 201 Memphis, TN 38188-0001 USA -David Payne
|
Version 96.03.06 |
Pentium III w/ Windows 2000 Professional | 11/22/2002 |
SHA-1     
(BYTE-only) "SHA-1 hash algorithm used in US Postal products to support the secure hashing of information." |
135 | IBM Zurich Research Laboratory Saeumerstrasse 4 Rueschlikon, CH 8803 Switzerland -Michael Osborne
|
Version JCOP21id Mask 20 (firmware) Part # P8WE5033 AEV 1034 188i |
Philips P8WE5033 | 11/14/2002 |
SHA-1     
(BYTE-only) "The JCOP21id is IBM's multi-application smart card, designed to the Java Card v2.1.1 and Global Platform v2.0.1 specifications. The smart card features IBM's PKCS#15 applet which provides standardized high-level security services including, 2048 bit key generation, DES, 3DES, SHA, RSA and AES." |
134 | Wei Dai 13440 SE 24th Street Bellevue, WA 98005 USA -Wei Dai
|
Version 5.01 |
Pentium III w/ Windows 2000 | 11/14/2002 |
SHA-1     
(BYTE-only) "The Crypto++ Library is a free, open source C++ class library providing public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms. The pre-compiled Win32 static library is FIPS 140-2 Level 1 validated. The library is also available in source code form." |
133 | NetOctave, Inc. 507 Airport Boulevard, Suite 111 Morrisville, NC 27560 USA -Pam Morris
|
Part # Rev. 3 |
Linux 2.4.18smp kernel.org distribution on a 1 GHz Dual Pentium III processor | 11/6/2002 |
SHA-1     
(BYTE-only) "NetOctave NSP3000 Series IPsec PMC and PCI boards accelerate IPsec processing at rates up to 1 Gbps." |
132 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
|
Version 4.1.1-22 |
Pentium III w/ GNU/Linux | 10/31/2002 |
SHA-1     
(BYTE-only) "StoneGate is a firewall and VPN solution. It features clustering, load balancing between multiple ISPs, encrypted VPN client connectivity and advanced central administration tools." |
131 | Stonesoft Corporation Itälahdenkatu 22A Helsinki, FI-00210 Finland -Klaus Majewski
|
Version 0.9.6c-2.woody.1.stonesoft.0 |
Pentium III w/ GNU/Linux | 10/31/2002 |
SHA-1     
(BYTE-only) "StoneGate is a firewall and VPN solution. It features clustering, load balancing between multiple ISPs, encrypted VPN client connectivity and advanced central administration tools." |
130 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA -Hazem Hassan
|
Version 2.0 |
Philips P8WE5033 | 10/24/2002 |
SHA-1     
(BYTE-only) "The Model 330J is Datakey's multi-application smart card, designed to the JavaCard v2.1.1 and Global Platform v2.0.1 specifications. The smart card features Datakey's JCCOS applet. JCCOS is an advanced cryptographic applet that, when loaded onto a multi-application JavaCard provides high-level security services." |
129 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version M256LCAEG1_ST_62_02_03, SM3v1 Part # ST19XT34 |
N/A | 10/24/2002 |
SHA-1     
(BYTE-only) "Cyberflex Access e-Gate 32K smart card serves as a highly portable, secure token for enhancing the security of network access and ensuring secure electronic communications, supporting on-card DES aND RSA algorithms with on-card key generation." 8/27/04: Update vendor address; |
128 | Ultra Information Systems, Inc. 13130 Roundup Avenue San Diego, CA 92129 USA -Dr. Lynn Spraggs
|
Version 1.0.0 |
INTEL PIII w/ Windows 2000 | 10/24/2002 |
SHA-1     
(BYTE-only) "The UIS Anonymous Key Technology Skyhook Security Suite is a software package with an API interface for performing cryptographic operations and at the same time for performing personal authentication. The module is based on symmetric AES encryption and the UIS AKT methodology." |
127 | IBM Corporation CC1A/502/K301 4205 S. Miami Blvd. Durham, NC 27703 USA -Keith Medlin
|
Version 1.5 |
Trusted Solaris 8, UltraSparc-II 400 MHz; Pentium III w/ Windows 2000 SP3 | 10/24/2002 |
SHA-1     
(BYTE-only) "The IBM Everyplace Wireless Gateway is a distributed, scalable, multipurpose communications platform that supports optimized, secure data access over a wide range of international wireless and wire line network technologies. The cryptographic module implements a variety of encryption services for the product." |
126 | IP Dynamics, Inc. 2880 Stevens Creek Boulevard, 3rd Floor San Jose, CA 95128 USA -Huan Wang
-Zulfikar Ramzan
|
Version 4.2 |
Pentium III w/ Windows NT 4.0 WorkStation, Service Pack 6 | 10/18/2002 |
SHA-1     
(BYTE-only) "The IP Dynamics’ VCN Software Suite creates a secure network services layer above the flat Internet address space allowing the creation of dynamic virtual communities, which are the secure, collaborative communications platforms designed for a wide range of intranet, extranet, remote access and collaboration applications." 11/18/02: Update vendor name, address, vendor POC, impl name, version, and description; |
125 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Pierre Boucher
|
Version 6.1 |
Intel Pentium II w/ Windows 2000 SP3; Solaris 9 | 10/10/2002 |
SHA-1     
(BYTE-only) "The Security Toolkit for Java takes advantage of the features of a Public Key Infrastructure (PKI) from a Java environment. The Toolkit provides the means to incorporate security features, such as encryption and digital signatures, into applications." |
124 | Standard Networks 344 South Yellowstone Drive Madison, 53705 USA -Reid MacGuidwin
|
Version 1.0.1.0 |
AMD Athlon w/ Windows 2000 | 9/25/2002 |
SHA-1     
(BYTE-only) "MOVEit Crypto is a compact 32-bit dynamically linked library (DLL) that provides encryption services to applications running on Microsoft Windows operating systems. The module provides an API featuring the latest NIST-approved encryption, hashing, and pseudo-random number generation algorithms." |
123 | Dekart SRL 75, Alba Iulia Str. MD2071, Kishinev, Republic of Moldova -Olga Petrova
|
Version 1.0 |
Pentium 4 w/ Windows 95 | 9/17/2002 |
SHA-1     
(BYTE-only) "A standards-based cryptographic library (API) realizing data encryption and hashing algorithms (DES, Triple DES, AES, GOST 28147-89, SHA-1, SHA-256, GOST 3411-94, MD5) intended for internal and external implementations." 04/13/05: Update vendor address; |
122 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1 |
206 MHz Intel StrongARM 32-bit RISC Processor w/ Windows CE 3.0 | 9/17/2002 |
SHA-1     
(BYTE-only) "The F-Secure Pocket PC Cryptographic Library is a 140-2 Level 1 compliant software module, implemented as a 32-bit Windows™ CE compatible DLL for Pocket PC and Pocket PC 2002 platforms. The Module provides an assortment of cryptographic services to client processes that attach instances of the Module DLL." |
121 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Bill Kennedy
|
Version 1.7 |
Pentium 4 w/ Windows 2000 | 9/9/2002 |
SHA-1     
(BYTE-only) "The Crypto-C ME Module is RSA Security, Inc.'s cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors while offering great flexibility and choice by allowing developers to select only the algorithms needed in reduced code sizes. Its functionality includes a wide range of data encryption and signing algorithms, including TDES, the high performing RC5, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more." |
120 | Columbitech Maria Bangatan 4A Box 381 73 Stockholm, SE-100 64 Sweden -David Broman
|
Version 1.4 |
Pentium III w/ Windows 2000 | 9/17/2002 |
SHA-1     
(BYTE-only) "WVPN software that enables strong encryption and roaming on Windows client, Pocket PC and DOS-devices. Focus on security, performance and convenience." |
119 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Mike Kouri
|
Version 4.0.0 (Firmware) Part # T8F05TB-0002 |
Proprietary hardware platform running ScreenOS 4.0.0 firmware | 9/9/2002 |
SHA-1     
(BYTE-only) 1 Byte <= Message Length <= 8K Bytes "The core security processor within NS-5200 security system, which delivers firewall, VPN, and traffic management optimized for the most demanding environments such as high traffic e-business sites, co-location facilities, ASP/ISP data centers and enterprise central sites." |
118 | Aladdin Knowledge Systems, Ltd. 15 Beit Oved Street Tel Aviv, 61110 Israel -Leedor Agam
|
Version 4.1 and 4.2 |
N/A | 9/9/2002 |
SHA-1     
(BYTE-only) "The eToken PRO is a fully portable USB device the size of an average house key which offers a cost-effective method for authenticating users when accessing a network and for securing electronic business applications. The eToken PRO offers security needs such as secure network logon, secure VPN's, secure email, and strong PKI support." 12/18/02: Update impl name; |
117 | Broadcom Corporation 1131 W Warner Road Tempe, AZ 85284 USA -Joe Wallace
|
Version B0, A2, A2 |
N/A | 9/9/2002 |
SHA-1     
(BYTE-only) "The BCM5820, BCM5821, and BCM5822 deliver industry leading performance and security functions for eCommerce and VPN applications." |
116 | Mitsubishi 5-1-1 Ofuna Kamakura, 247-8501 Japan -Tetsuo Nakakawaji
|
Version 2.0.1.1 |
N/A | 8/22/2002 |
SHA-1     
(BYTE-only) "Encryption Accelerator Card" |
115 | Palm, Inc. 5470 Great American Parkway Santa Clara, CA 95054 USA -Rebecca Taylor
|
Version 2.0 |
Palm i705 w/ Palm OS 4.1 | 8/16/2002 |
SHA-1     
(BYTE-only) "Crypto Manager 2.0 provides cryptographic services such as encryption, decryption, hashes, and key generation. It features strong encryption via AES, HMAC-SHA-1 message authentication and SHA-1 digests. Using the Crypto Manager API, Palm application developers can incorporate these services without expertise in cryptography." |
114 | IBM 11400 Burnet Rd Austin, TX 78758 USA -Steve Omrani
|
Version 5.1 |
Pentium III w/ Windows 2000 | 8/7/2002 |
SHA-1     
(BYTE-only) "Software implementation of the FIPS 180-1 algorithm, in support of IBM Directory Server." |
113 | TLC-Chamonix, LLC 120 Village Square, Suite 11 Orinda, CA 94563 USA -Phil Smith
|
Version 2.0 |
Pentium III w/ Redhat Linux 7.0 (2.2.16 kernel) | 8/7/2002 |
SHA-1     
(BYTE-only) "Cranite's WirelessWall software suite provides the ultimate in comprehensive security for enterprise wireless LAN installations. The Wireless Access Controller (WAC) software component segregates the enterprise’s wireless access infrastructure from the protected corporate network. The WAC delivers superior network protection and FIPS-certified privacy by providing enhanced authentication services, robust traffic encryption, and directory-integrated authorization enforcement. Working in tandem with Cranite’s WirelessWall Client and Policy Server, WAC software brings enterprise-grade security to wireless LANs." 3/25/04: Update vendor POC; |
112 | Hewlett-Packard Company 19091 Pruneridge Ave., Building CAC-46 MS 4441 Cupertino, CA 95014 USA -Theresa Conejero
|
Part # 524103-001 Rev A |
N/A | 7/24/2002 |
SHA-1     
(BYTE-only) "The Atalla Cryptographic Engine (ACE) is a multichip module that provides state of the art, secure cryptographic processing. The ACE features secure key management and storage capabilities, and also provides high performance TripleDES and SHA-1 hashing." 09/12/11: Update vendor information; |
111 | Motorola, Inc - Semiconductor Products Sector 6501 William Cannon Drive West MD: OE56 Austin, TX 78735-8598 USA -Geoff Waters
|
Part # PPC190VF |
N/A | 7/16/2002 |
SHA-1     
(BYTE-only) "The Cerberus PPC190 is a security co-processor, designed to accelerate encryption and authentication algorithms commonly used in networking and communications. The PPC190 connects to the host system via a PCI bus. See Technical Summary for additional details." |
110 | Bodacion Technologies' 18-3 Dundee Rd., Suite 300 Barrington, IL 60010 USA -Eric Uner
|
Version 1.4 (Firmware) |
PowerPC G4 | 7/3/2002 |
SHA-1     
(BYTE-only) "HYDRA is an internet server built without an operating system from the ground up to be totally secure. It contains everything you need to run a high-performance, secure Web site including HTTP, HTTPS, and FTP servers, Web-based administration, and Java/JSP capabilities." |
109 | CyberGuard Corporation 350 SW 12th Ave Deerfield Beach, FL 33442 USA -Soheila Amiri
|
Version 5.0PSU1 (Revision) |
Pentium III w/ SCO UnixWare 2.1.3 | 6/21/2002 |
SHA-1     
(BYTE-only) "The cyberguard Firewall/VPN is a packet-filtering and application proxy gateway, which allows or blocks the routing of specific network services between networks based on a set of administrator-defined rules. Packet-filtering rules provide administrative control over hosts, services allowed through the firewall, and direction of communication. The VPN feature of CyberGuard Firewall ensures that this communication takes place over secure virtual private networks by using cryptographic algorithms to protect the data while en-route." |
108 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 01 Part # M512LACC1_SI_29_05_01 |
N/A | 6/13/2002 |
SHA-1     
(BYTE-only) "The Cyberflex Access 64K smart card can be employed in solutions which provide secure PKI (public key infrastructure) and digital signature technology. Cyberflex Access 64K serves as a highly portable, secure token for enhancing the security of network access and ensuring secure electronic communications. Cyberflex Access 64K supports on-card Triple DES and 1024-bit RSA algorithms with on-card key generation. It is compliant to Java Card v2.1.1 and Open Platform v2.0.1. The Cyberflex Access 64K smart card is part of a range of SchlumbergerSema highly secure, Java-based smart cards for physical and logical access, e-transactions and other applications." 8/27/04: Update vendor address; |
107 | IBM Corporation 2455 South Road Poughkeepsie, NY 12601 USA -Barry K. Ward
|
Version 2.41 |
IBM 4758 Models 002/023 | 6/5/2002 |
SHA-1     
(BIT) "The IBM 4758 PCI Cryptographic Coprocessor provides a secured environment in which application programs can perform and carry out cryptographic functions." |
106 | Galea Secured Networks 602 Cure Boivin Boisbriand, Quebec J7G 2A7 Canada -Gaetan Hache
|
Version 1 |
Broadcom BCM 5820 | 6/5/2002 |
SHA-1     
(BYTE-only) "The Galea Crypto Engine Version 1 provides cryptographic functionalities for the Galea Secured Networks products. In particular, it is used in the firmware code of the hardware cryptographic module SSK-100 SDK" |
105 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version R1 Part # 8065-PBn/n |
N/A | 5/28/2002 |
SHA-1     
(BYTE-only) "The 8065 chip is used in network security products. Security algorithms include DES, TDES, AES, and SHA-1, which conform to NIST requirements." |
104 | Novell, Inc. 1800 South Novell Place Provo, UT 84606 USA -Gabriel Waters
|
Version 2.4.0 Part # 870-000768-001 |
UltraSPARC III w/ Solaris 8 | 5/28/2002 |
SHA-1     
(BYTE-only) "Novell International Cryptographic Infrastructure for Solaris" |
103 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Lee Klarich
|
Part # T8F59TB-0101 |
N/A | 5/20/2002 |
SHA-1     
(BYTE-only) "NetScreen 204/208 are purpose-built internet security appliances that deliver firewall, VPN, and traffic shaping optimized for the most demanding environments such as high traffic e-business sites, co-location facilities, ASP/ISP data centers and enterprise central sites." |
102 | BRECIS Communications 2025 Gateway Place, Suite 132 San Jose, CA 95110 USA -Raymond Tan
|
Version 1.0 |
N/A | 5/15/2002 |
SHA-1     
(BYTE-only) "MSP2000 is Multi-Service Processor targeted at security appliances and business-class Ethernet-to-Ethernet routers where high-performance, secure communications is a key requirement." |
101 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version R1 Part # 8165-PBn/n |
N/A | 5/8/2002 |
SHA-1     
(BYTE-only) "The 8165 chip is used in network security products. Security algorithms include DES, TDES, AES, and SHA-1, which conform to NIST requirements." |
100 | Information Security Corporation 1141 Lake Cook Road, Suite D Deerfield, IL 60015 USA -Michael J. Markowitz, VP R&D
|
Version 7.0 |
Pentium III w/ Windows 2000 Pro | 5/8/2002 |
SHA-1     
(BYTE-only) "A software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. Includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions." |
99 | Securit-e-Doc, Inc. 515 N. Flagler Drive #P-400 West Palm Beach, FL 33401 USA -Brent L. Ravdin
|
Version 3.0 |
Pentium III w/ MS Windows 2000 | 5/1/2002 |
SHA-1     
(BYTE-only) "Securit-e-Doc(R) provides secure server-based transmission and storage of files and messages using interactive, Web-enabled interfaces. All components of the Securit-e-Doc system derive their security services from the underlying SITT(R) CryptoSystem. SITT(R), implemented within the Securit-e-Doc application software, provides real-time cryptographic services for symmetric encryption and decryption, random number generation and message digesting." |
98 | Broadcom Corporation 1131 W Warner Road Tempe, AZ 85284 USA -Joe Wallace
|
Part # Revision A1 |
N/A | 4/29/2002 |
SHA-1     
(BYTE-only) "The BCM5821 delivers industry leading performance and security functions for eCommerce and VPN applications Systems with PCI" |
97 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 3.3.3 |
Intel Pentium w/ Windows NT | 4/29/2002 |
SHA-1     
(BYTE-only) "The Crypto-J Module is a Java-language software dvelopment kit that allows software and hardware developers to incorporate encryption technologies directly into their products." |
96 | Lucent Technologies 101 Crawfords Corner Road 4D-218 Holmdel, NJ 07733 USA -Steve Reustle
|
Version 6.0.545 |
Intel Pentium w/ Windows 2000 | 4/15/2002 |
SHA-1     
(BYTE-only) "The Brick 1000 is a carrier-grade integrated firewall and virtual private network (VPN) gateway appliance specifically designed for web/application data center security, large-scale managed security services, and remote access VPN services. Called the Brick because of its rugged, reliable design, this is an ideal platform for service providers seeking wide scalability, ready manageability, and industry-leading performance." |
95 | nCipher Inc. 500 Unicorn Park Drive Woburn, MA 01801-3371 USA -Marcus Streets
|
Version 2 |
Motorola Power PC | 4/15/2002 |
SHA-1     
(BYTE-only) "The nCipher algorithm library provides cryptographic functionality for nCipher's nForce 800/1600 secure e-commerce accelerators and nShield Hardware Security Modules." |
94 | Lucent Technologies 101 Crawfords Corner Road Room 4G-218 Holmdel, NJ 07733 USA -Roberta Eggert
|
Version 2.6 |
Motorola MPC8260 w/ APOS Version 2.6 | 4/8/2002 |
SHA-1     
(BYTE-only) "The Access Point Operating System delivers IP services with multi-access routing, Quality of Service (QoS) with Class-Based Queuing (CBQ), secure Virtual Private Networks (VPN), firewall security, and policy management. And the service provider has the advantages of easy deployment to multi-size customer premises locations, and the implementation of flexible management facilities that can be both customer and/or service provider managed." |
93 | Motorola 200 North Point Center East, Suite 400 Alpharetta, GA 30022 USA -Alfred Adler
|
Version 3.0 |
Intel Pentium III w/ Windows NT 4.0 | 4/15/2002 |
SHA-1     
(BYTE-only) "The Encryption DLL Module is incorporated into the Motorola Messaging Server, an enterprise system for managing data between a corporate e-mail or database system and a wireless device, and the Motorola MyMail Desktop Plus, a personal application to manage e-mail between the desktop and a wireless device." |
92 | Motorola 200 North Point Center East, Suite 400 Alpharetta, GA 30022 USA -Christopher Yasko
|
Version 5.3 |
Intel Pentium III w/ Windows 2000 Pro | 4/15/2002 |
SHA-1     
(BYTE-only) "The Encryption Services Module is incorporated into the operating software of the Accompli 009 -- the first wireless communications device to incorporate tri-band GSM and GPRS protocols, phone functionality, Internet access, e-mail, Triple-DES encryption, WAP browser and short message service (SMS) with a full QWERTY keyboard and 256-color screen." |
91 | ITT Aerospace/Communications Division 1919 West Cook Road Fort Wayne, Indiana 46818 USA -Tom Jewel
|
Version 8196204 |
AMPRO CM2-SXI-Q-74 (386 Intel 25Mhz; VxWorks 5.4) | 3/21/2002 |
SHA-1     
(BYTE-only) "Software hosted on a Single Board Computer that acts as a public key, RSA/SHA-1, based authentication agent within the FAA's NEXCOM Multi-Mode Digital Radio." |
90 | Tricipher, Inc. 1900 Alameda de las Pulgas, Suite 112 San Mateo, CA 94403 USA -Tim Renshaw
|
Version 2.5 |
Custom FreeBSD Linux Version 4.1 | 3/18/2002 |
SHA-1     
(BYTE-only) "The SingleSignOn.Net Secure Identity Appliance is a Public Key Infrastructure (PKI) and password authentication solution. It allows for the easy deployment of PKI within an organization and provides an ID/Password system that uses the underlying PKI to provide security and robustness." 2/22/05: Update vendor POC info; |
89 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Mike Harvey (Product Manager)
-Certicom Eastern US Sales Office
|
Version 1.0 |
Pentium III w/ Windows 98 | 3/11/2002 |
SHA-1     
(BYTE-only) "Security Builder GSE is a standards-based cryptography toolkit that provides application developers with the sophisticated tools and flexibility needed to integrate encryption, digital signatures, and other security mechanisms into their applications. Security Builder provides the cryptographic core for a variety of Certicom products, including movianCrypt(c), movianVPN(c), SSL Plus(c), Trustpoint(c), PKI products, toolkits, certificates, and WTLS Plus(c). Security Builder is also licensed to third party companies." |
88 | Altarus Corporation 607 Herndon Parkway Herndon, VA 20170 USA -Ludge Olivier
|
Version 2.1 |
Pentium, Windows 2000 | 3/14/2002 |
SHA-1     
(BYTE-only) "The Altarus offering provides a premier platform and rapid development tools for creating, extending, and deploying secure enterprise applications to the desktop, mobile devices, or handheld devices. Our product facilitates efficient data transfer while allowing for unprecedented real-time performance, mission critical reliability and security. Our product also enables companies to leverage existing IT resources - I.e., LAN or WAN, satellite, wired, or dial-up connection - while extending new information access methods." |
87 | AEP Networks 40 West Gude Drive, Suite 100 Rockville, MD 20850 USA -Chris Brook
|
Pentium III,Linux Redhat 7.2(kern 2.4.5) | 3/4/2002 |
SHA-1     
(BYTE-only) "AEP Networks SmartGate is leading client/server Virtual Private Network (VPN) software that provides enterprise-level security to network-based users for private information and private TCP/IP application services. SmartGate provides encryption, strong user authentication, authorization, management, accounting, key distribution, and proxy capabilities. It consists of server (SmartGate) and client (SmartPass) software." |
|
86 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Douglas Clark
|
Version AAA Part # PSD Hardware Module 1A80000 |
N/A | 2/25/2002 |
SHA-1     
(BYTE-only) "The Pitney Bowes Compliant Meter Postal Security Device (PSD) has been designed in compliance with the United States Postal Service (USPS), Information-Based Indicia Program (IBIP). It employs strong encryption, decryption, and digital signature techniques for the protection of customer funds in Pitney Bowes IBIP Metering products. The PSD is a secure module employed within the metering product which performs high-speed cryptographic functions, funds management, and printer administration functions that preclude unauthorized disbursing of indicia. The PSD has been designed to support international postal markets and their rapidly evolving requirements for digital indicia." |
85 | Cloakware Corporation 260 Hearst Way, Suite 311 Kanata, Ontario K2L 3H1 Canada -Faramarz Fallah
|
Version 1.1 (SHA-1) |
1. ARM 209Mhz, WinCE 3.0; 2. Motorola Dragonball 20Mhz, Palm OS 3.5 | 2/25/2002 |
SHA-1     
(BYTE-only) "It is a part of Cloakware/Signature. Cloakware/Signature is a password replacement software; it replaces passwords with a user's handwritten signature. This module is used internally by Cloakware/Signature to encrypt the Signature Template and Application Passwords." |
84 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1 |
Pentium III, Windows XP Workstation | 2/11/2002 |
SHA-1     
(BYTE-only) "The F-Secure Kernel Mode Cryptographic Driver is a 140-2 Level 1 compliant software module, implemented as a 32-bit Windows NT/2000/XP compatible export driver. When loaded into computing system memory, it resides at the Kernel Mode level of the Windows OS and provides an assortment of cryptographic services that are accessible by other kernel mode drivers through an Application Program Interface (API)." |
83 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.1.2518.0 |
x86 Processor w/ Windows XP | 2/5/2002 |
SHA-1     
(BYTE-only) "The Microsoft Enhanced Cryptographic Provider (RSAENH) is a FIPS 140-1 Level 1 compliant, general-purpose, software-based, cryptographic module. It encapsulates several different cryptographic algorithms (SHA-1, DES, 3DES, AES, RSA, SHA-1-based HMAC) in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. Can be dynamically linked into applications to permit the use of general-purpose FIPS 140-1 Level 1 compliant cryptography." |
82 | Gemplus Avenue du Pic de Bertagne GEMENOS Cedex, BP100 13881 FRANCE -Luc Astier, Product Line Manager
|
Version Hardware GP92 , Firmware GXP3-FIPS |
N/A | 1/25/2002 |
SHA-1     
(BYTE-only) "The "GemXpresso Pro E64 PK - FIPS with ActivCard Applet Suite" is based on a Gemplus Open OS Smart Card (Java Card 2.1.1, OP 2.0.1, 64K of EEPROM), and on platform-independent cryptographic applets developed by ActivCard (ID, PKI, and GC applets). The card and applets provide authentication and digital signature cryptographic services to end-users." |
81 | Cylink Corporation 3131 Jay Street P.O. Box 54952 Santa Clara, CA 95056-0952 USA -Mark Liedstrand
-Jeff Davis
|
MC68360 (processor) | 1/15/2002 |
SHA-1     
(BYTE-only) This certificate is a decoupling of the joint DSS/SHS #5 with no new retesting of SHS data. "Feature set in Turbo Crypto Card that implements SHS/DSS algorithms." |
|
80 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 1.0 Part # ST19XT34 |
N/A | 1/14/2002 |
SHA-1     
(BYTE-only) Does not hash the NULL message. "The Cryptoflex e-Gate card is a credit-card sized computer with a crypto-processor dedicated to security and implements security industry functions based on public key cryptography directly onto the card. The Cryptoflex e-gate card incorporates, apart from the conventional ISO 7816-3 interface, also the USB interface normally resident in the smart card reader." 8/27/04: Update the vendor address; |
79 | Entrust CygnaCom 7927 Jones Branch Drive Suite 100 West McLean, VA 22102-3305 USA -Miles E. Smid
|
Version 1.0 Part # 1000 |
Dell Pentium -s w/ Unix V/386, R3.2 V4.2 | 1/9/2002 |
SHA-1     
(BYTE-only) "C code implementing Triple DES (TDES), Triple DES in Cipher Block Chaining Mode (TCBC), and the SHA-1 hash algorithms." |
78 | Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 USA -Stephen Lewis
|
Version 3.0 |
Pentium III w/ Windows 2000 | 1/7/2002 |
SHA-1     
(BYTE-only) "Ensures the confidentiality, integrity and authenticity of all email sent over the Internet. Resides between an organization's email server and firewall. It encrypts outbound messages and decrypts inbound messges based on organization-defined policies. It uses a key server to retrieve a unique key to individually encrypt each outgoing message and decrypt each incoming message. Works with any authenitication mechanism." 11/04/08: Update vendor information; |
77 | 3S Group Incorporated 125 Church Street, N.E., Suite 204 Vienna, VA 22180 USA -Satpal S Sahni
|
Part # T2CSS-208 |
N/A | 12/10/2001 |
SHA-1     
(BYTE-only) "T2CSS is a multiple cryptoprocessor PCI board and cryptographic server. Provides high assurance security services; secure session/virtual token management; scalabel server performance(multiple boards); Government and commercial algorithms; FORTEZZA CI, PKCS #11, other APIs; and Windows NT/2000, Solaris and Linux support." |
76 | WinMagic Inc. 160 Traders Blvd. E., Suite 210 Mississauga, Ontario L4Z 3K7 Canada -Thi Nguyen-Huu
|
Version 3.1 |
Intel 1.4GHz Processor w/ Windows NT 4.0 SP6 | 12/3/2001 |
SHA-1     
(BYTE-only) "TTOKI is the Cryptographic kernel used in all of WinMagic's SecureDoc® cryptographic products including the Disk Encryption application and the Central Database administration facility." |
75 | Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151 USA -Antoine Kelman
|
Version V4 Part # 006 181 381 |
N/A | 12/3/2001 |
SHA-1     
(BYTE-only) "The CosmopolIC 2.1 V4 product is a highly secure and powerful multi-application Java Card platform for smart cards. The product is fully interoperable and complies with JavaCard 2.1.1 and Open Platform 2.0.1 standards. It supports both T=0 and T=1 protocols, DES, 3DES, SHA, RSA signature and key generation up to 2048 bits." |
74 | Cadence Design Systems, Inc. 1 The Alba Campus Livingston, West Lothian EH54 7HH Scotland, UK -Mark Lewis
|
Part # T-CS-EN-0003-100 |
N/A | 12/3/2001 |
SHA-1     
(BYTE-only) "Hashing Core IP module performs SHA-1 and MD-5, also incorporated in Tality IPSec Coprocessor. Suitable for IPSec HMAC and Digital Signature Standard Random Number Generation. Fully synchronous streaming bus interface. 75MHz operation at 0.25um." 12/04/06: Update vendor POC info; |
73 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 3.1 (Firmware Version FIPS ) |
Cisco Systems Proprietary | 12/3/2001 |
SHA-1     
(BYTE-only) "The Cisco VPN 3000 Concentrator Series is a best-of-breed, remote-access VPN solution for enterprise-class deployment. Includes Hardware Models 3005, 3015, 3030,3060,3080 3002 Hardware Client." |
72 | ValiCert, Inc. 339 N. Bernardo Avenue Mountain View, CA 94043 USA -Chini Krishnan
|
Version 1.0 |
Sun Solaris 2.8 and Microsoft Windows 2000 Server | 11/20/2001 |
SHA-1     
(BYTE-only) "ValiCert Security Module 1.0 is the name of the module that will contain DES, TDES, and SHA-1 algorithms. The module will be included in a variety of ValiCert products, e.g. ValiCert Validation Authority (VA), ValiCert Transaction Authority (TA), and ValiCert Secure Transport (ST)." |
71 | McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054 USA -Mike Siegel
|
Version 4.1 |
Pentium III w/ Windows 2000 | 11/14/2001 |
SHA-1     
(BYTE-only) "McAfee Endpoint Encryption for Devices is a high performance software solution that provides sector-level encryption of a PC's hard drive in a manner that is totally transparent to the user. In addition, the centralized McAfee Endpoint Encryption management system provides robust recovery tools, administration, and implementation" 05/12/08: Update vendor and implementation information; |
70 | Sun Microsystems, Inc. USCA 17-201 4170 Network Circle Santa Clara, CA 95054 USA -Stephen Borcich
|
Version 3.2.2 |
Linux RedHat 7.1 running a 2.4 kernel | 11/6/2001 |
SHA-1     
(BYTE-only) "A set of libraries designed to support cross-platform development of security-enabled applications. See http://www.mozilla.org/projects/security/pki/nss." |
69 | Check Point Software Technologies, Ltd. 12700 Sunrise Valley Drive, Suite 130 Reston, VA 20191 USA -Scott Armstrong
-Mark Elliot
|
Ultra Sparc IIi w/ Solaris 2.6 | 10/10/2001 |
SHA-1     
(BYTE-only) "Integrates access control, authentication and encryption to guarantee the security of corporate network connections, and the authenticity of local and remote users, satellite offices and key partners. It may be deployed on a wide range of platforms for maximum flexibility and scalability." |
|
68 | CTAM PTY, LTD. 399 High Street Ashburton, Victoria 3147 Australia -Peter Sim
|
Version 1.0.0 |
Cyphercell ATM Encryptor w/ MPC860 processor | 9/18/2001 |
SHA-1     
(BYTE-only) "Software implementation of SHA1 in byte mode." |
67 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 1.0 Part # 73-4201-06/ Board Revision B0 |
N/A | 9/17/2001 |
SHA-1     
(BYTE-only) "The ISA is a single-width service adapter. It provides high-performance, hardware-assisted tunneling and encryption services suitable for VPN remote access and site-to-site intranet/extranet applications while working with all services necessary for successful VPN deployments. The ISA off-loads IPSec and MPPE processing from the main processor of the Cisco 7200 series router, thus freeing resources on the processor engine." |
66 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 1.1 Part # 73-4201-07/Board Revision A0 |
N/A | 9/17/2001 |
SHA-1     
(BYTE-only) "The ISM is a single-width service module. It provides high-performance, hardware-assisted tunneling and encryption services suitable for VPN remote access and site-to-site intranet/extranet applications while working with all services necessary for successful VPN deployments. The ISM off-loads IPSec and MPPE processing from the main processor of the Cisco 7100 series router, thus freeing resources on the processor engine." |
65 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version R2 Part # 7851-PB4/2 |
N/A | 9/14/2001 |
SHA-1     
(BYTE-only) "Used in network security products. Security algorithms include DES, TDES, and SHA-1, which conform to NIST requirements." |
64 | Chrysalis-ITS, Inc. One Chrysalis Way Ottawa, ON K2G 6P9 Canada -Carlos Fox
|
Version 3.9 (Firmware) |
N/A | 8/13/2001 |
SHA-1     
(BYTE-only) "Luna XPplus offers hardware-accelerated signing, secure key management, and signature validation for high volume transaction applications such as transaction coordinators and OCSP (Online Certificate Status Protocol) responders. The product operates in conjunction with Luna® CA³ root key protection systems leveraging ultimate private key integrity for high-volume digital signing applications." |
63 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Mike Teal
|
Version 2.1 |
Cryptek Secure Executive (CSE) | 7/26/2001 |
SHA-1     
(BYTE-only) "A network security appliance that enforces the network security policies controlled by the DiamondCentral. DiamondLink is an external device, installed between a host and the network that provides multiple user-selectable security profiles." 09/22/04: Update vendor POC; |
62 | F-Secure Corporation Tammasaarenkatu 7 Helsinki, 00181 Finland -Alexey Kirichenko
|
Version 1.1 |
Intel Pentium III w/ Windows NT 4,SP 6A | 7/17/2001 |
SHA-1     
(BYTE-only) "A FIPS 140-1 Level 1 compliant software module, implemented as a 32-bit Windows NT compatiable DLL, which provides a variety of cryptographic services and can be dynamically linked into applications by software developers to get access to general-purpose cryptographic functionality." |
61 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 2 Part # ST19CF68 |
N/A | 7/17/2001 |
SHA-1     
(BYTE-only) Does not hash Null message. "Smartcard" 8/27/04: Update the vendor address; |
60 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Marc Laroche
|
Version 6.0 |
Intel 233 Processor w/ Windows NT 4.0 | 7/6/2001 |
SHA-1     
(BYTE-only) "Performs low level cryptographic operations - encryption, decryption and hashes - implemented in software using the high-level Java programming language. Currently, the module is imbedded into an applet as part of the TruePass product suite that allows integration of cryptographic security into web applications." |
59 | RSA Security, Inc. 2955 Campus Drive, Suite 400 San Mateo, CA 94403 USA -Kathy Kriese
|
Version 5.2.1 |
Dell Dimension XPS T700r w/ Windows 2000 | 7/6/2001 |
SHA-1     
(BYTE-only) "The RSA BSAFE Crypto-C Version 5.2.1 is a software development kit that allows software and hardware developers to incorporate encryption technologies directly into their products. It provides a variety of cryptographic services to calling applications which are documented in RSA’s RSA BSAFE Crypto-C Security Components for C Library Reference Manual. RSA BSAFE Crypto-C is a C language API available as a static library, a dynamic library and as source code." |
58 | Algorithmic Research Ltd. 10 Nevatim Street Kiryat Matalon Petach Tikva, 49561 Israel -Gadi Aharoni
|
Version 3.0 |
N/A | 6/13/2001 |
SHA-1     
(BYTE-only) "PrivateServer performs sensitive cryptographic functions internally in a tamper-proof, high-performance box configured as a network server or as a cryptographic backend to a host." |
57 | Axalto Inc. 8311 North FM 620 Road Austin, TX 78726 USA -David Teo
|
Version 2 |
SLE66CX320P | 6/13/2001 |
SHA-1     
(BYTE-only) "Smart Card" 8/27/04: Update the vendor address; |
56 | Corsec Security, Inc 10340 Democracy Lane, Suite 201 Fairfax, VA 22030 USA -Carl Wallace
|
Version 1.0 |
Pentium III 733 w/ Windows 2000 | 6/5/2001 |
SHA-1     
(BYTE-only) "A software cryptographic module that provides an intuitive, high-level API that can be customized to allow support for new or application specific protocols and data sources." |
55 | Eracom Technologies Group,Eracom Technologies Australia, Pty. Ltd 28 Greg Chappell Drive Burleigh Heads, Queensland Q1d 4220 Australia -Mark Goodall
|
N/A | 6/1/2001 |
SHA-1     
(BYTE-only) "An intelligent network adapter card that provides a wide range of cryptographic functions with dedicated DES/3DES and RSA hardware accelerators and supports Smart Card authentication tokens. This cryptographic server takes the form ofa two-thirds length PCI adapter card." |
|
54 | Odyssey Technologies Ltd. A2, 5th Floor Parsn Manere, 602 Anna Salai, Chennai 600 006 India -Smitha Joshi
|
Version 1.0 |
Sun Ultra 5 WS, SPARC Iii,Solaris v2.7 | 6/1/2001 |
SHA-1     
(BYTE-only) "A cryptographic toolkit with "c" call interface for providing cryptographic and other security functionality to applications. Also serves as a PKI-enabling toolkit for appicaitons. Features include DES, 3DES, RC4, RC5, CAST, RSA, DSA, DH, MD5, SHA1, HMAC, PKCS, X.509, CRL interfaces, S/MIME, SSL, TLS." |
53 | PrivyLink International Ltd 77 Science Park Drive #02-05/07 Cintech III Singapore Science Park I 118256 Singapore -Daphne Tng
|
CKS Hardware w/ Windows NT 4.0 | 5/23/2001 |
SHA-1     
(BYTE-only) "A hardware security solution that offers a tamper-resistant environment for highly sensitive e-commerce transaction processing. It safeguards sensitive private key and secret information with strong physical and logical security, and offloads computationally intensive cryptographic operations from the applications." |
|
52 | VPNet Technologies, Inc 1500 Buckeye Drive Milpitas, CA 95035 USA -Pete Stefanko
|
Version 3.1 |
VSU100/VSU100R/VSU2000/VSU5000/VSU7500 | 5/7/2001 |
SHA-1     
(BYTE-only) "The VSU(TM) series of VPN gateways provide high performance ICSA certified IPSec VPN and firewall services for networks of all sizes and complexity. All VSU modes are tamper evident network security applicances that cost effectively provide secure authenticated communications over public IP networks, and protect private enterprise networks from attack or intrusion." |
51 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
N/A | 5/7/2001 |
SHA-1     
(BYTE-only) "The Hi/fn 7811 offers single-pass compression, encryption and authentication. Plus, you get an on-chip random number generator, FIPS 140-1 Level-3 compliance and support for both Layer 2 and Layer 3 protocols." |
|
50 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Tom Gilbert
|
Version 6.0 |
N/A | 4/24/2001 |
SHA-1     
(BYTE-only) "A network security appliance for the construction of secure Virtual Private Networks between Internet sites, and between Internet sites and individual remote users." |
49 | Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, VA 20151 USA -Tom Gilbert
|
Version 6.0 |
Blue Ridge Proprietary | 4/24/2001 |
SHA-1     
(BYTE-only) "A network security appliance for the construction of secure Virtual Private Networks between Internet sites, and between Internet sites and individual remote users." |
48 | Network Security Technology (NST) Co. 5F, No.31, Sec.1 Chung-Hsiao E. Rd., 100 Taipei, Taiwan -Ming-Chih Tsai
|
Version 1.0 Part # CC2200 |
Pentium III 667 w/ MS Windows NT Server4 | 3/16/2001 |
SHA-1     
(BYTE-only) "A security cryptographic add-on card in host; is a "multi-chip embedded cryptographic module" that provides hardware cryptographic services to users. Provides hardware cryptographic services such as acceleration for bulk data encryption/decryption, digital signature generation/verification, secure key generation, storage and key management functions to its users." |
47 | Juniper Networks, Inc. 1194 N. Mathilda Ave. Sunnyvale, CA 94089 USA -Lee Klarich
|
Version B |
N/A | 5/7/2001 |
SHA-1     
(BYTE-only) "A purpose-build internet security applicance that delivers firewall, VPN, and traffic shaping that is optimized for the most demanding environments such as high traffic e-business sites, co-location facilities, data centers and enterprise central sites." |
46 | PrivyLink International Ltd 77 Science Park Drive #02-05/07 Cintech III Singapore Science Park I 118256 Singapore -Daphne Tng
|
N/A | 2/20/2001 |
SHA-1     
(BYTE-only) "A hardware security solution that offers a tamper-resistant environment for highly sensitive e-commerce transaction processing. It safeguards sensitive private key and secret information with strong physical and logical security, and offloads computationally intensive cryptographic operations from the applications." |
|
45 | Research in Motion 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada -Government Certifications Team
|
Version 2.1 |
RIM Device and PC (Intel) w/ RIM OS and | 2/7/2001 |
SHA-1     
(BYTE-only) "Encryption library for the RIM Device and server applications." |
44 | Ensuredmail 1708 Lovering Avenue, Suite 202 Wilmington, DE 19806 USA -Andrew Edelsohn
|
Dell PC w/ Windows 2000 | 12/19/2001 |
SHA-1     
(BYTE-only) "Client-side 3DES file encryption software" |
|
43 | Francotyp-Postalia AG & Co. Triftweg 21-26 Birkenwerder, D-16547 Germany -Dirk Rosenau
|
Version 1.0 |
Intel Pentium PC w/ Windows NT 4.0 | 12/21/2000 |
SHA-1     
(BYTE-only) "An embedded hardware module which provides security-critical services for the Information Based Indicia Program (IBIP) of the United States Postal Service (USPS). It is used to suport new secure methods of applying postage." |
42 | Check Point Software Technologies, Ltd. 12700 Sunrise Valley Drive, Suite 130 Reston, VA 20191 USA -Mark Elliot
-Scott Armstrong
|
Sun Ultra 5 (Ultra Sparc III), w/ Solaris 2.6 | 4/24/2001 |
SHA-1     
(BYTE-only) "Integrates access control, authentication and encryption to guarantee the security of corporate network connections, and the authenticity of local and remote users, satellite offices and key partners. VPN-1 Gateway/VPN-1 Applicance may be deployed on a wide range of platforms." |
|
41 | Neopost Industrie 113 Rue Jean Marin Naudin Bagneux, 92220 France -Patrick Blanluet
|
Version 6.1 Part # 41004962 |
N18D + Emulation socket + Emulator MB219 w/ EVA-Chip FR30 MB91V101 | 12/11/2000 |
SHA-1     
(BYTE-only) "Cryptographic software module used for control of the cryptographic chip of the N18D Postage Meter." |
40 | Novell, Inc. 1800 South Novell Place Provo, UT 84606 USA -Gabriel Waters
|
Version 2.0 Part # 870-000539-001 |
Compaq DeskPro w/ Intel Pentium II 450mh | 11/6/2000 |
SHA-1     
(BYTE-only) "Novell International Cryptographic Infrastructure for Windows 95/98" |
39 | John Halleck P.O. Box 58488 Salt Lake City, UT 84158-0488 USA -John Halleck
|
Version 2.0 |
Sparc Ultra 10, w/ Sun Solaris | 9/20/2000 |
SHA-1     
(BIT) "An Ada Library that implements SHA-1. Open Source Licensing" |
38 | AEP Networks Focus 31, West Wing Cleveland Road Hemel Hempstead, Herts HP2 7BW UK -Paul Healy
|
Version 1.0E SHA-1 |
Motorola 860T (PowerPC), ISI pSOS+ | 7/17/2002 |
SHA-1     
(BYTE-only) "The AEP Networks CryptoKernels exist in both software only and in hardware accelerated forms; they are general purpose cryptographic modules employed in a variety of AEP Systems products." |
37 | Chrysalis-ITS, Inc. One Chrysalis Way Ottawa, ON K2G 6P9 Canada -Blair Powell
|
Part # 1.33 |
N/A | 7/17/2000 |
SHA-1     
(BYTE-only) "Luna VPN PCI Card." |
36 | Dallas Semiconductor 4401 Beltwood Parkway Dallas, TX 75244-3292 USA -Dennis Jarrett
|
Version 1.01 Part # DS1955B-401 |
N/A | 7/19/2000 |
SHA-1     
(BYTE-only) For messages of length <=1024 bits. "Stainless steel-encased single-chip Java virtual machine (VM), Java Card 2.0-compliant, sends data as applets over the Internet. Enhancements: 32-bit integers, random number generator, garbage collector. Resources: 64-kbyte ROM for firmware and VM, 6 kbytes fast NV RAM for stack support in multiple, independent applications. Firmware contains support for javacardx.crypto (SHA-1, RSA, DES, triple DES public key cryptographic classes for digital signatures). Math accelerator performs RSA encryption in less than one second. The iButton case initiates immediate zeroization of memory if opened. Applications include secure Internet transactions and e-Commerce." For messages of length <=1024 bits. |
35 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.0.2195.1569 |
Pentium Pro 200 mHz w/ Windows 2000 | 7/17/2002 |
SHA-1     
(BYTE-only) "A cryptomodule for kernel mode use on Windows2000." |
34 | Fortress Technologies, Inc. 4023 Tampa Road Suite 2000 Oldsmar, FL 34677 USA -Dr. Stephen Kovacs
|
Version 4.0 |
AMD K6-2 w/ Linux kernel 2.0.36 | 6/20/2000 |
SHA-1     
(BYTE-only) "VPN implemented as a multichip standalone module. The NetFortress 10 provides cryptographic services (encryption, decryption, key management) in a networked environment. Single- or triple-DES modes may be specified at the time of manufacture. The device is designed to operate by itself in a stand-alone 24/7 environment after initial configuration by the crypto-officer." |
33 | L-3 Communications One Federal Street Camden, NJ 08103 USA -Ron Paraggio
|
Version 960v |
N/A | 6/20/2000 |
SHA-1     
(BIT) For data oriented on multiples of 16 bits. "A voice encryption module to provide security for voice telephony applications." Tested and validated only for the correct hashing of data oriented on multiples of 16 bits. |
32 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Pentium Pro 200 mHz w/ Windows 2000 | 6/20/2000 |
SHA-1     
(BYTE-only) "A cryptomodule for use on Windows2000." |
|
31 | Nortel 600 Technology Park Billerica, MA 01821 USA -Jonathan Lewis
|
Version 2.60 Part # DM 1401A33 (128-bit), DM 1401A34 (56-bit) |
CES 4500 w/ Intel Xeon Pentium III and VxWorks | 5/15/2000 |
SHA-1     
(BYTE-only) "The Contivity 4500 Extranet Switch provides up to 5000 branch office or end user IPSEC tunnels with a flexible easy to manage and cost effective package. 5 PCI expansion slots, dual 10/100 LAN ports, dual redundant power supplies and storage, unlimited IPSEC client licenses." |
30 | Cryptek, Inc. 1501 Moran Road Sterling, VA 21066-9309 USA -Michael Teal
|
Version 1.110 |
Intel Pentium III, w/ MS Windows98 | 3/13/2000 |
SHA-1     
(BYTE-only) "Crypto NIC card running a software implementation of SHA-1." 09/22/04: Update vendor POC; |
29 | Technical Communications Corporation 100 Domino Drive Concord, MA 01742 USA -Steve Lusk
|
Version 1.0 |
N/A | 5/2/2000 |
SHA-1     
(BYTE-only) |
28 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 3 Part # 7751 PT6/3 |
N/A | 2/17/2000 |
SHA-1     
(BYTE-only) "Encryption, compression, and authentication processor with PCI DMA master." |
27 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Brian Romansky
|
Intel Pentium, w/ MS WindowsNT 4.0 | 12/21/1999 |
SHA-1     
(BYTE-only) "Software-based cryptographic module." |
|
26 | Cisco Systems, Inc. 7025-6 Kit Creek Road PO Box 14987 Research Triangle Park, NC 27709-4987 USA -Ray Potter
|
Version 12.1 T |
SHA: MPC860 Power Quicc,w/ Cisco IOS; TDES:Cisco 3640, Cisco 7140, Cisco 7206 w/ MI | 12/6/1999 |
SHA-1     
(BYTE-only) "Feature set to deliver IPSEC solutions." |
25 | IBM Corporation 3605 Highway 52 North Rochester, MN 55901 USA -John R. Griffith
|
AS/400, w/ Operating System/400 | 9/14/1999 |
SHA-1     
(BYTE-only) "Integrated into OS/400 and is part of the OS/400 Trusted Computing Base. This CSP supplies the underlying cryptographic services for OS/400's SSL, VPN, and Digital Certificate Manager functions." |
|
24 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.0.2102.1 |
PentiumII, w/ MS Windows2000 | 9/14/1999 |
SHA-1     
(BYTE-only) "Provides domestic-grade encryption of the following cryptographic algorithms: RC4, RC2, DES, 3DES, SHA-1, MD5, MD2, MD4, and RSA." |
23 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.0.2102.1 |
PentiumII, w/ MS Windows2000 | 9/14/1999 |
SHA-1     
(BYTE-only) "Provides export-grade encryption of the following cryptographic algorithms: RC4, RC2, DES, SHA-1, MD5, MD2, MD4, and RSA." |
22 | Florida Department of Transportation 605 Suwannee St. MS69 Tallahassee, FL 32301 USA -Warren G. Clary
|
Version 1.5 |
Pentium Pro 200, w/ MS WindowsNT Workstation 4.0 SP3 | 8/18/1999 |
SHA-1     
(BYTE-only) "The SHS is implemented as a C++ class developed for the Professionals' Electronic Data Delivery System (PEDDS). This system is used by Professional Engineers to sign and seal electronic files as defined by the Florida Department of Business and Professional Regulations, Board of Professional Engineers." |
21 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.0.1877.7 |
PentiumII, w/ MS WindowsNT 4 SP6 | 9/14/1999 |
SHA-1     
(BYTE-only) "Domestic (US / Canada) Cryptographic Service Provider, supplying RSA, DES, and SHA-1 functionality for WindowsNT 4 OS." |
20 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA |
Version 5.0.1877.7 |
PentiumII, w/ MS WindowsNT 4 SP6 | 9/14/1999 |
SHA-1     
(BYTE-only) "Cryptographic Service Provider, supplying RSA, DES, and SHA-1 functionality for WindowsNT 4 OS." |
19 | Entrust, Inc. 1000 Innovation Drive Ottawa, Ontario K2K 3E7 Canada -Marc Laroche
|
Version 5.0/5.0A |
Intel Pentium, w/ Microsoft WindowsNT 4. | 6/21/1999 |
SHA-1     
(BYTE-only) "A software cryptographic library used internally in the Entrust product family." |
18 | Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 USA -Kristy Browder
|
Version 8.1.6 |
N/A | 4/9/1999 |
SHA-1     
(BYTE-only) "The Oracle Advanced Security (OAS) option provides a comprehensive suite of security features to protect an enterprise's networks and to securely extend corporate networks to the Internet. The OAS option (formerly Advanced Networking OptionTM) provides a single source of integration with network encryption and authentication solutions, single sign-on services, and security protocols, to deliver security to the Oracle network and beyond." |
17 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 2 Part # 7751 PT6/2 |
N/A | 5/11/1999 |
SHA-1     
(BYTE-only) "Encryption, compression, and authentication processor." |
16 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version V3 Part # 7711PT6/3 |
N/A | 12/11/1998 |
SHA-1     
(BYTE-only) "Encryption, compression, and authentication coprocessor." |
15 | Certicom Corporation Certicom Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON L4W 5L1 Canada -Mike Harvey
-Certicom Eastern US Sales Office
|
Version 1.23 |
N/A | 11/13/1998 |
SHA-1     
(BYTE-only) "Provides security for Fax machines. It is placed between the Fax machine and the phone line and allows for encrypted Fax's when a CERTIFAX exists on both ends of a fax call." |
14 | Litronic, Inc. 17861 Cartwright Road Irvine, CA 92614 USA -Charles Frasier
|
Part # Mask Version: Vsn.3.0 |
N/A | 10/22/1998 |
SHA-1     
(BYTE-only) "The Argus/300 is a cryptographic module/smartcard reader that interfaces to the host computer through an ISA port. It provides encryption and signing using DES and SHA-1." |
13 | Bokler Software Corp P.O. Box 261 Huntsville, AL 35804 U.S.A. -Duane L. Violett, Jr.
|
Version 2.1 |
Intel Pentium, w/ MS WindowsNT 4.0 | 9/11/1998 |
SHA-1     
(BYTE-only) "A modular software implementation of SHA-1, available as a DLL or an ActiveX™ control for Windows developers." |
12 | Neopost, Inc. 30955 Huntwood Ave. Hayward, CA 94544-7084 USA -Neil P. Graver
|
Version 1.0 |
Intel PentiumII, w/ MS WindowsNT 4.0 Workstation | 8/28/1998 |
SHA-1     
(BYTE-only) "This module is part of the Postage Plus system that provides security services to support the secure accounting and cryptographic functions required to implement the United States Postal Service's Information-Based Indicia Program." |
11 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA -Frederick W. Ryan, Jr.
|
Version (Mask v.MST50; Filter v.ST50_4) |
N/A | 7/23/1998 |
SHA-1     
(BYTE-only) "The PC Meter Cryptographic Module consists of a single IC - an SGS Thompson ST16CF54A. The interface to the IC is a serial interface which conforms to the ISO/IEC 7816-3 smart card standard. The module provides security services to support the secure accounting and cryptographic functions required to implement the USPS (U.S. Postal Service) IBIP (Information Based Indicia Program)." |
10 | V-ONE Corporation 20300 Century Blvd., Suite 200 Germantown, MD 20874 USA -Tim Armstrong
|
Version 1.0 |
AMD K-6 233 MHz, w/ MS Windows95 | 7/9/1998 |
SHA-1     
(BYTE-only) "The V-ONE SHA-1 Module implements the SHA-1 algorithm on a Windows95 platform in 32-bit code." |
9 | Hifn, Inc. 750 University Avenue Los Gatos, CA 95032 USA -Hank Cohen
|
Version 2 Part # 7711 PT6/2 |
N/A | 6/4/1998 |
SHA-1     
(BYTE-only) "Encryption, compression, and authentication processor." |
8 | Dallas Semiconductor 4401 Beltwood Parkway Dallas, TX 75244-3292 USA -Dennis Jarrett
|
Version 1.01 Part # DS1954-004 |
N/A | 4/3/1998 |
SHA-1     
(BYTE-only) For messages of length <=1024 bits. "Provides hardware cryptographic services (e.g., secure private key storage, high-speed math accelerator for 1024-bit public key crypto, hashing). Services provided using a single silicon chip packaged in a 16mm stainless steel case. Can be worn or attached to an object for info at point of use. Can withstand harsh outdoor environments and is durable for everyday wear." For messages of length <=1024 bits. |
7 | Chrysalis-ITS, Inc. One Chrysalis Way Ottawa, ON K2G 6P9 Canada -Blair Canavan
VP Sales
|
Version 1.19 (Firmware) |
N/A | 8/25/1997 |
SHA-1     
(BYTE-only) "The Luna PCMCIA Encryption Module is a hardware module offering data encryption/decryption and signature generation/verification services." |
6 | Information Security Corporation 1141 Lake Cook Road, Suite D Deerfield, IL 60015 USA -Michael Markowitz
-Mike Gaspar
|
Version 3.14/1.35 |
Intel Pentium-150, w/MS Windows95 | 8/13/1997 |
SHA-1     
(BYTE-only) "Comprehensive library of linkable cryptographic modules also used in the Secret Agent public-key file encryption utility." |
5 | Netherlands Forensic Science Laboratory Netherlands Ministry of J Volmerlaan 17 2288 GD Riswijk, The Netherlands |
Pentium-166, w/ MS WindowsNT 4.0 | 5/2/1997 |
SHA-1     
(BYTE-only) "SHA4LABS is used to hash digital criminal evidence to prove data has not been manipulated." |
|
4 | Polaroid Corp. 201 Burlington Rd. Bedford, MA 01730 USA -Jim Howard
|
Version 1.0 |
Intel-Pentium; MS-DOS 6.2 | 4/9/1997 |
SHA-1     
(BYTE-only) "DSA/SHA-1 algorithm implementations." |
3 | Levi, Ray & Shoup 2401 W. Monroe Springfield, IL 62704 USA -Larry Patia
|
Version 7.0 |
IBM P/390, MVS/ESA v5.2 | 2/7/1997 |
SHA-1     
(BYTE-only) "VPS takes output from the MVS JES2/JES3 spool and routes it to remote printers, or for archival/distribution/retrieval." |
2 | CertifyIt, Inc. P.O. Box 7447 Little Rock, AR 72217 USA |
Intel 386, w/ MS-DOS 6.22 | 1/17/1997 |
SHA-1     
(BIT) "This implementation is one component of the CertifyIt program; specified for Intel architecture 32-bit microprocessor-based systems which store data internally in a little endian format." |
|
1 | National Semiconductor Corporation (This cryptomodule and NSC's Fortezza business unit have been discontinued.) |
Part # 990010947-200 |
N/A | 11/19/1996 |
SHA-1     
(BYTE-only) |
Computer Security Division
National Institute of Standards and Technology