205 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA
Ian Hall ian_hall@symantec.com 703-598-6876
Diana Robinson diana_robinson@symantec.com 845-454-6397
| MC Java Cryptographic Library 1.0 (Firmware)
The MC Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center firmware developed specifically for use in the Management Center appliances. | | 10/26/2018 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4666, DRBG #2470
|
204 | Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA
Ian Hall ian_hall@symantec.com 703-598-6876
Diana Robinson diana_robinson@symantec.com 845-454-6397
| MC VA Java Cryptographic Library 1.0
The MC VA Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center software developed specifically for use in the Management Center appliances. | - Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
| 10/26/2018 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4663, DRBG #2468
|
203 | WISeKey Rue de la carrière de Bachasson Arteparc de Bachasson, Bâtiment A Meyreuil, Bouches du Rhone F-13590 France
Dupaquis vdupaquis@wisekey.com +33 442370081
Benchaalal obenchaalal@wisekey.com +33 442370025
| Vault-IC 407 1.0.1 (Firmware)
The VaultIC407 ASSPs designed to secure various systems against counterfeiting, cloning or identity theft. It is a hardware security module that can be used in many applications such as IP protection, access control or hardware protection. | - High-performance, Low Enhanced RISC Architecure
| 10/26/2018 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4659, ECDSA #1576, DRBG #2465
|
202 | Totemo AG Freihofstrasse 22 Kuesnacht, Zuerich 8700 Switzerland
Marcel Mock marcel.mock@totemo.com +41 (0) 44 914 9900
| Totemo Cryptographic Module (TCM) 3.0
The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites. | - Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
| 10/19/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4657, ECDSA #1572, DRBG #2463
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4657, DSA #1496, DRBG #2463
|
201 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); Virtual TPM Implementations 10.0.17134
The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V | - Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro April 2018 Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise April 2018 Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Pro April 2018 Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Core on Hyper-V on Windows Server 2016 (x64)
- Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet w/ Windows 10 Pro April 2018 Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise April 2018 Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise April 2018 Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro April 2018 Update (x64)
- Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Home April 2018 Update (x86)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Education April 2018 Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Enterprise April 2018 Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter Core on Hyper-V on Windows Server (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro April 2018 Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Standard Core on Hyper-V on Windows Server (x64)
- Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go w/ Windows 10 Pro April 2018 Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise April 2018 Update (x64)
| 10/12/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4633, ECDSA #1565, DRBG #2436
|
200 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); SymCrypt Cryptographic Implementations 10.0.17134
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
- Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
- Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
- Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
- Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
- Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
- Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
- Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
- Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
- Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
- Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
- Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
- Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
- Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
- Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
- Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
- Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
- Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
| 10/5/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4633, ECDSA #1563, DRBG #2435
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4633, DSA #1479, DRBG #2435
|
199 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN6000 Series Common Crypto Library 5.0.1 (Firmware)
The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 9/21/2018 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4561, ECDSA #1543, DRBG #2303
|
198 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library 5.0.1 (Firmware)
The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services. | | 9/14/2018 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4560, ECDSA #1542, DRBG #2302
|
197 | FP InovoLabs GmbH Prenzlauer Promenade 28 Berlin, Berlin 13089 Germany
Janos Laube j.laube@francotyp.com +49 30 220660 397
Hasbi Kabacaoglu h.kabacaoglu@francotyp.com +49 30 220660 656
| NpsdCrypto N-PSD rev. 04 1.0 (Firmware)
nRevenector Cryptographic Library | | 9/4/2018 | - KAS FFC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #4538, DSA #1455, DRBG #2286
|
196 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team securitycertifications@gemalto.com
| SafeNet Cryptographic Library 1.0 (Firmware)
The SafeNet Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC. | | 8/17/2018 | - KAS FFC:
- Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4533, DSA #1453, DRBG #2283
|
195 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team securitycertifications@gemalto.com
| SafeNet Accelerated Cryptographic Library 1.0 (Firmware)
The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC. | | 8/17/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4533, ECDSA #1526, DRBG #2283
- KAS FFC:
- Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4533, DSA #1452, DRBG #2283
|
194 | BlackBerry Certicom 5th Floor, 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.2
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - ARMv8 w/ Android 8.1.2 on Venturi K502 Android tablet manufactured by Infomark
| 8/2/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4506, ECDSA #1519, DRBG #2251
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4506, DSA #1444, DRBG #2251
|
193 | BlackBerry Certicom 5th Floor, 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.2
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - ARMv8 w/ Android 6.0.1 on BlackBerry Priv
| 8/2/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4505, ECDSA #1518, DRBG #2250
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4505, DSA #1443, DRBG #2250
|
192 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certification Team SecurityCertfications@gemalto.com
| ProtectServer Internal Express Cryptographic Library 5 (Firmware)
The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 7/20/2018 | - KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4476, DSA #1434, DRBG #1704
|
191 | Elster GmbH Strothweg 1 Lotte (Buren) 49504 Germany
Michael Habermann michael.habermann@honeywell.com +49-541-1214-215 Fax: +49-541-1214-595
Markus Bölter markus.boelter@honeywell.com +49-541-1214-114 Fax: +49-541-1214-595
| elster_cv 02.02.01 (Firmware)
elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters. | | 7/20/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Partial Public Key Validation
- Schemes:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- Prerequisite: SHS #4458, ECDSA #1498, DRBG #2210
|
190 | BlackBerry Certicom 5th Floor, 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.2
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
- Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
- Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
- Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
| 7/13/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4445, ECDSA #1490, DRBG #2194
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4445, DSA #1421, DRBG #2194
|
189 | Infosec Global Inc. 2225 Sheppard Avenue East Suite 1402 Toronto, Ontario M2J 5C2 Canada
Brian Neill brian.neill@infosecglobal.com 416-492-3333 Fax: 647-343-6933
Ian Laidlaw ian.laidlaw@infosecglobal.com 416-492-3333 Fax: 647-343-6933
| AgileSec FIPS Provider 1.0 1.0
AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards. | - Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
- Intel Core i5 CPU with AES-NI w/ OSX 10.12
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
- Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
- Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
- Intel Core i5 CPU without AES-NI w/ OSX 10.12
- Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
- Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
- Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
| 7/13/2018 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4441, ECDSA #1489, DRBG #2192
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CMAC
- Prerequisite: AES #5534, SHS #4441, DSA #1419, DRBG #2192
|
188 | SafeLogic, Inc. 530 Lytton Ave Suite 200 Palo Alto, CA 94301 USA
SafeLogic Inside Sales sales@safelogic.com 844-436-2797
| CryptoComply for Java 3.0.1
SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing. | - Intel i7 w/ Java SE 8 on Windows Server 2012 R2
- Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
| 7/6/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #5532, AES #5532, SHS #4439, ECDSA #1487, DRBG #2190, HMAC #3684
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #5532, AES #5532, SHS #4439, DSA #1417, DRBG #2190
|
187 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA
Chris Wood cwood06@harris.com 585-720-8730 Fax: 585-241-8459
Esther Betancourt ebetanco@harris.com 585-242-3635 Fax: 585-241-8459
| Harris Broadband Ethernet Radio GPP Cryptographic Library 6.0 (Firmware)
This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products | | 6/29/2018 | - KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4434, DSA #1416, DRBG #2187
|
186 | Information Security Corporation 1011 Lake St. Suite 425 Oak Park, IL 60118 USA
Jonathan Schulze-Hewett schulze-hewett@infoseccorp.com 708-445-1704 Fax: 708-445-9705
Michael Markowitz markowitz@infoseccorp.com 708-445-1704 Fax: 708-445-9705
| ISC Cryptographic Development Kit (CDK) 8.0
The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions. | - Intel Core i7 with AES-NI w/ Windows Server 2012 R2/64-bit
| 6/29/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3625, ECDSA #1055, DRBG #1416
|
185 | Silvus Technologies 10990 Wilshire Blvd. STE 1500 Los Angeles, CA 90024 USA
Ajit Warrier ajit@silvustechnologies.com 310-479-3333 ext 41 Fax: 310-479-2225
Weijun Zhu weijun@silvustechnologies.com 310-479-3333 ext 27 Fax: 310-479-2225
| Silvus Crypto Module 3.15.1 (Firmware)
The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios. | | 6/15/2018 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4406, ECDSA #1474, DRBG #2167
|
184 | Securosys SA Forrlibuckstrasse 70 Zurich, Zurich 8005 Switzerland
Marcel Dasen dasen@securosys.ch +41 44 552 31 33
Robert Rogenmoser roro@securosys.ch +41 44 552 31 11
| Primus HSM Cryptographic Library XC7K160T 2.5.3 (Firmware)
Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG. | | 6/15/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation
- Schemes:
- Static Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4402, ECDSA #1471, DRBG #2160
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation
- Schemes:
- dhStatic:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #4402, DSA #1412, DRBG #2160
|
183 | Arista Networks Inc. 5453 Great America Pkwy Santa Clara, CA 95054 USA
Richard Whitney rw@arista.com 703-627-6092 Fax: 408-538-8920
Ethan Rahn erahn@arista.com 408-547-5825
| EOS MACsec Hybrid Firmware v1.0 1.0 (Firmware)
The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module. | | 6/15/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4399, ECDSA #1469, DRBG #2158, HMAC #3636
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-256, SHA-384
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384
- MAC: HMAC
|
182 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA
David Suksumrit david.suksumrit@viasat.com 760-476-2200 Fax: 760-929-3941
Lorenzo Page lorenzo.page@viasat.com 760-893-4198
| EbemCrypto 13 (Firmware)
Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat's Enhanced Bandwidth Efficient Modem (EBEM). | | 6/15/2018 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4393, ECDSA #1466, DRBG #2154
|
181 | REDCOM Laboratories, Inc One REDCOM Center Victor, NY 14564-0995 United States
Sal Ceravolo Sal.ceravolo@redcom.com 585-905-0451
Chris Hasenauer Chris.hasenauer@redcom.com 585-905-0451
| REDCOM Encryption 140-2 3.0.1
REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. | - Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
- Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
| 6/1/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #5457, AES #5457, SHS #4377, ECDSA #1457, DRBG #2140
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #5457, AES #5457, SHS #4377, DSA #1404, DRBG #2140
|
180 | KeyNexus, Inc. 205-2657 Wilfert Road Victoria, BC V9B6A7 Canada
Jason Novecosky jason@keynexus.net
| KeyNexus Cryptographic Library 1.0
The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products. | - Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
| 5/25/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #5453, SHS #4373, ECDSA #1454, DRBG #2137, HMAC #3611
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #5453, SHS #4373, DSA #1403, DRBG #2137
|
179 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park 300 Taiwan, R.O.C.
Yossi Talmi yossi.talmi@nuvoton.com +972-9-9702364 Fax: +972-9-9702001
Oren Tanami oren.tanami@nuvoton.com +972-9-9702390 Fax: +972-9-9702001
| Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine LAG019
Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38 | | 5/3/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4325, ECDSA #1425, DRBG #2088
|
178 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.3.0
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security. | - Intel Atom C3558 without AES-NI w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
- Intel Atom C3558 with AES-NI w/ QNX SDP 7
- Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
- Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
- TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
- TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
| 4/27/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4321, ECDSA #1423, DRBG #2084
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4321, DSA #1391, DRBG #2085
|
177 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Manoj Maskara mmaskara@vmware.com 650-427-1000 Fax: 650-475-5001
| VMware BC-FJA (Bouncy Castle FIPS Java API) 1.0.0
The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API). | - Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
| 4/9/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #5365, AES #5365, SHS #4307, DSA #1386, ECDSA #1415, DRBG #2076, HMAC #3553
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM/CMAC/HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- Prerequisite: AES #5365, AES #5365, SHS #4307, DSA #1386, DRBG #2076
|
176 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| Aruba Common Cryptographic Module (CCM) 1.0.0
The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols. | - Intel Core i7 w/ Windows 10 64-bit User Mode
- Intel Core i5 w/ Windows 10 32-bit User Mode
| 3/30/2018 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4296, ECDSA #1405, DRBG #2065
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4296, DSA #1380, DRBG #2065
|
175 | BlackBerry Certicom 5th Floor, 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.1
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
| 3/30/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4294, ECDSA #1404, DRBG #2063
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4294, DSA #1379, DRBG #2063
|
174 | BlackBerry Certicom 5th Floor, 4701 Tahoe Blvd, Building A Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.1
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
| 3/30/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4293, ECDSA #1403, DRBG #2062
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4293, DSA #1378, DRBG #2062
|
173 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations 10.0.15063.728
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
- Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
- Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
- Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
- Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
- AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
| 3/16/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4253, ECDSA #1386, DRBG #2037
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4253, DSA #1373, DRBG #2037
|
172 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| ProtectServer Internal Express Cryptographic Library 5.01 (Firmware)
The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 3/9/2018 | - KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4252, DSA #1372, DRBG #1704
|
171 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); Cryptography Next Generation (CNG) Implementations 10.0.14393.1770
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
- AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
- Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
- Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
- Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
- Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
- AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
- Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
- Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
- Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
| 3/9/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4250, ECDSA #1384, DRBG #2036
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4250, DSA #1371, DRBG #2036
|
170 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Enterprise LTSB (version 1507); Cryptography Next Generation (CNG) Implementations 10.0.10240.17643
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
- Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
- AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
- Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
| 3/9/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4248, ECDSA #1383, DRBG #2035
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4248, DSA #1370, DRBG #2035
|
169 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); Cryptography Next Generation (CNG) Implementations 10.0.10586.1176
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
- AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
- Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
- AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
- Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
- Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
- AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
- Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
- Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
| 3/9/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4246, ECDSA #1381, DRBG #2033
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4246, DSA #1369, DRBG #2033
|
168 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS OpenSSL Module ArubaOS 6.5.1 (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 2/23/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4236, ECDSA #1375, DRBG #2017
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4236, DSA #1366, DRBG #2017
|
167 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module ArubaOS 6.5.1 (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 2/23/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4235, ECDSA #1374
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4235, DSA #1365
|
166 | Giesecke & Devrient GmbH Prinzregentenstraße 159 München, Bayern 81677 Germany
Ulrich Stutenbäumer ulrich.stutenbaeumer@gi-de.com +49 89 4119-2923 Fax: +49 89 4119-2819
| StarSign PIV Applet V 1.0 on Giesecke+Devrient Sm@rtCafé Expert 7.0 1.0 (Firmware)
The ECC CDH (Modified Diffie-Hellman) primitive is used as a One-Pass Diffie-Hellmann key-establishment scheme based on elliptic curve cryptography and the Diffie-Hellman algorithm both provided by the Giesecke+Devrient Sm@rtCafé Expert 7.0 module. | - SLE78CLFX4000P(M) / M7892 family
| 2/16/2018 | - KAS ECC:
- Functions: Full Public Key Validation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Key Confirmation:
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CMAC
- Prerequisite: AES #2720, SHS #2289, ECDSA #476, DRBG #455
|
165 | Gemalto Avenue du Jujubier Z.I Athelia IV La Ciotat, 13705 France
Frederic Garnier Frederic.Garnier@gemalto.com +33 442364368 Fax: +33 442366953
Didier Bonnet Didier.Bonnet@gemalto.com +33 442366803 Fax: +33 442365545
| Gemalto Cryptographic library for IDCore 3130 on SLE78 Infineon SLE78CLFX400VPHM 1.9 (Firmware)
IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms. | - Infineon SLE78 chip (M7892)
| 2/16/2018 | - KAS ECC:
- Functions: Domain Parameter Validation, Partial Public Key Validation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Key Confirmation:
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CMAC
- Prerequisite: AES #5243, SHS #4221, ECDSA #1365, DRBG #2005
|
164 | Silver Spring Networks 230 W Tasman Drive San Jose, CA 95134 USA
Andrew Pendray support@ssni.com +1 669 770 4000 Fax: +1 886 776 0015
| Silver Spring Networks Endpoint Security Module 130-0117-03 82136; 1.00 (Firmware)
Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products. | - ESM instruction manager processor
| 2/9/2018 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #4148, ECDSA #1362, DRBG #1906
|
163 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.3.0
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security. | - Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
- Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
- TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
- TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
- Intel Atom C3558 without AES-NI w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
- Intel Atom C3558 with AES-NI w/ QNX SDP 7
| 2/9/2018 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4210, ECDSA #1359, DRBG #1996
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4210, DSA #1356, DRBG #1996
|
162 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ancrypto.dylib 1.0.0
The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols. | | 2/9/2018 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4305, ECDSA #1357, DRBG #2074
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4305, DSA #1354, DRBG #2074
|
161 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| libancrypto.so 1.0.0
The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols. | - Intel Core i7 w/ Linux 2.6 64-bit
| 2/9/2018 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4208, ECDSA #1356, DRBG #1994
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4208, DSA #1353, DRBG #1994
|
160 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ancrypto.dll 1.0.0
The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols. | - Intel Core i7 w/ Windows 7 64-bit User Mode
- Intel Core i5 w/ Windows 7 32-bit User Mode
| 2/9/2018 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2316, ECDSA #1355, DRBG #496
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2316, DSA #1352, DRBG #496
|
159 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| libancrypto.so 1.0.0
The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols. | - Intel Core i5 w/ Linux 2.6 32-bit
| 2/9/2018 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2317, ECDSA #1354, DRBG #498
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2317, DSA #1351, DRBG #498
|
158 | Forcepoint 10900-A Stonelake Blvd. Ste. 350 Austin, TX 78759 USA
Klaus Majewski legal@forcepoint.com 1-858-320-8000
Jorma Levomäki legal@forcepoint.com 1-858-320-8000
| Forcepoint NGFW FIPS Java API 1.0.0
Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product | - Intel Xeon E5 w/ Java 8 on Linux 2.6.32
| 1/26/2018 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4173, ECDSA #1337, DRBG #1944
- KAS FFC:
- Functions: Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #4173, DSA #1338, DRBG #1944
|
157 | Infineon Technologies AG Alter Postweg 101 Augsburg, BY 86159 Germany
Roland Ebrecht Roland.Ebrecht@infineon.com +49-821-25851-68 Fax: +49-821-25851-40
Thomas Hoffmann Thomas.Hoffmann@infineon.com +49-821-25851-24 Fax: +49-821-25851-40
| Trusted Platform Module 2.0 SLB 9670 SLB 9670 7.83 (Firmware)
Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group. | - Infineon SLB 9670 security controller IC
| 1/5/2018 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #4129, ECDSA #1314, DRBG #1886
|
156 | RSA Security LLC 174 Middlesex Turnpike Bedford, MA 01730 USA
FIPS Program fips-program@rsa.com
| RSA BSAFE® Crypto-J JSAFE and JCE Software Module 6.2.4
RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements. | - Intel Core i5 w/ Windows 10 (64-bit)
- Qualcomm Snapdragon w/ Android 7.1.2
| 12/8/2017 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4085, ECDSA #1283, DRBG #1841, HMAC #3340
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4085, DSA #1321, DRBG #1841
|
155 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| Luna K6 Cryptographic Library 6.24.6 (Firmware)
The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 12/8/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4080, ECDSA #1280
|
154 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| Luna G5 Cryptographic Library 6.24.6 (Firmware)
The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 11/30/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4075, ECDSA #1278
|
153 | Cavium, Inc. 2315 N 1st Street San Jose, CA 95131 USA
Tejinder Singh Tejinder.Singh@caviumnetworks.com 408-943-7403 Fax: 408-577-1992
Phanikumar Kancharla Pkkancharla@caviumnetworks.com 408-943-7496
| ngfips_kas CN52XX 1.0.1 (Firmware)
The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto. | - Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
| 11/30/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1165, ECDSA #1276, DRBG #32, HMAC #736
|
152 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| ProtectServer Internal Express Cryptographic Library 5 (Firmware)
The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions. | - AMCC 440EPx Power PC (PPC440EPx) Embedded
| 11/30/2017 | - KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #4063, DSA #1308
|
151 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| Luna IS Cryptographic Library 6.3.2 (Firmware)
The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 11/22/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4050, ECDSA #1266
|
150 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Microsoft Surface Hub Virtual TPM Implementations 10.0.15063.674
The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
| 11/17/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4011, ECDSA #1253, DRBG #1734
|
149 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations 10.0.16299
The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V | - Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
- AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
- Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
| 11/17/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #4009, ECDSA #1252, DRBG #1733
|
148 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Microsoft Surface Hub SymCrypt Cryptographic Implementations 10.0.15063.674
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
| 11/17/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4011, ECDSA #1250, DRBG #1732
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4011, DSA #1303, DRBG #1732
|
147 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations 10.0.15254
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
- Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
- Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
| 11/17/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4010, ECDSA #1249, DRBG #1731
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4010, DSA #1302, DRBG #1731
|
146 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations 10.0.16299
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
- AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
- Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
| 11/9/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #4009, ECDSA #1246, DRBG #1730
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #4009, DSA #1301, DRBG #1730
|
145 | Flonidan A/S Islandsvej 29 Horsens, Denmark DK-8700 Denmark
Tonny Frederiksen twf@flonidan.dk +45 75 61 88 88
Kenneth Sørensen ks@flonidan.dk +45 75 61 88 88
| Flonidan Smart Meter mbedTLS Module 2.4.0 (Firmware)
Crypto module used in Flonidan smart meters | | 11/3/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3696, DRBG #1471
|
144 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Common Cryptographic Module AOS VMC 6.4.2.0-1.3-FIPS (Firmware)
Linux on Intel | | 10/13/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3167, ECDSA #830, DRBG #1044
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3167, DSA #1294, DRBG #1044
|
143 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2425, ECDSA #519, DRBG #528
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2425, DSA #1293, DRBG #528
|
142 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3408, ECDSA #950, DRBG #1188
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3408, DSA #1292, DRBG #1188
|
141 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2630, ECDSA #581, DRBG #660
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2630, DSA #1291, DRBG #660
|
140 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2246, ECDSA #466, DRBG #433
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2246, DSA #1290, DRBG #433
|
139 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2425, ECDSA #519, DRBG #528
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2425, DSA #1289, DRBG #528
|
138 | Aruba, a Hewlett Packard Enterprise company 3333 Scott Blvd Santa Clara, CA 95054 USA
Steve Weingart steve.weingart@hpe.com 512-319-2480
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 10/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2425, ECDSA #519, DRBG #528
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2425, DSA #1288, DRBG #528
|
137 | HID Global 6623 Dumbarton Circle Fremont, CA 94555 USA
Jean-Luc Azou jlazou@hidglobal.com 510-574-1738 Fax: 510-574-0100
Béatrice SALAUN bsalaun@hidglobal.com + 33 1 42 04 84 56
| KAS ECC OnePassDH 2.7.4.12 (Firmware)
KAS ECC OnePassDH component implements ECC OnePassDH Key Agreement with Key Confirmation (Key Agreement Role Responder - Key Confirmation Role Provider and Type Unilateral). Supported cryptographic suite: EC: P-256 / SHA256 / CMAC | - Gemalto: NXP SmartMX2 P60 chip family
| 9/29/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Key Confirmation:
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CMAC
- Prerequisite: AES #3543, SHS #2921, DRBG #900
|
136 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Manoj Maskara mmaskara@vmware.com 650-427-1000 Fax: 650-475-5001
Michael McKay mmckay@vmware.com 650-427-3615 Fax: 650-475-5001
| VMware BC-FJA (Bouncy Castle FIPS Java API) 1.0.0
The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API). | - Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
| 9/1/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #4760, AES #4760, SHS #3902, ECDSA #1192, DRBG #1637, HMAC #3171
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM/CMAC/HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #4760, AES #4760, SHS #3902, DSA #1280, DRBG #1637
|
135 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS Java API 1.0.1
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. | - Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
- Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
| 9/1/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #4759, AES #4759, SHS #3901, ECDSA #1191, DRBG #1636, HMAC #3170
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #4759, AES #4759, SHS #3901, DSA #1279, DRBG #1636
|
134 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| Luna K7 Cryptographic Library 7.0.1 (Firmware)
The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules. | | 9/1/2017 | - KAS FFC:
- Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #3897, DSA #1274, DRBG #1634
|
133 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certifications Team SecurityCertifications@gemalto.com
| Luna K7 Accelerated Cryptographic Library 7.0.1 (Firmware)
The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules. | | 9/1/2017 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3896, ECDSA #1188, DRBG #1634
- KAS FFC:
- Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #3896, DSA #1274, DRBG #1634
|
132 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park 300 Taiwan, R.O.C.
Yossi Talmi yossi.talmi@nuvoton.com +972-9-9702364 Fax: +972-9-9702001
Oren Tanami oren.tanami@nuvoton.com +972-9-9702390 Fax: +972-9-9702001
| Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine LAG019
Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16 | | 8/25/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3890, ECDSA #1183, DRBG #1628
|
131 | Arista Networks Inc. 5453 Great America Pkwy Santa Clara, CA 95054 USA
Richard Whitney rw@arista.com 703-627-6092 Fax: 408-538-8920
| Arista EOS Crypto Module v1.0
The Arista EOS Crypto Module library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner. | - AMD Athlon NEO X2 w/ EOS v4
- Intel Sandy Bridge EN w/ EOS v4
- Intel Broadwell-DE w/ EOS v4
- AMD G Series: eKabini w/ EOS v4
- AMD G Series: Steppe Eagle w/ EOS v4
| 8/18/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3516, DSA #998, DRBG #1340
- KAS FFC:
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-256, SHA-384
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384
- MAC: HMAC
- Prerequisite: SHS #3516, DSA #1141, DRBG #1340
|
130 | SafeLogic, Inc. 530 Lytton Ave Suite 200 Palo Alto, CA 94301 USA
SafeLogic Inside Sales sales@safelogic.com (844) 436-2797
| CryptoComply Java Engine 3.0.1
CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. | - Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
| 8/11/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #4702, AES #4702, SHS #3849, ECDSA #1160, DRBG #1600, HMAC #3114
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #4702, AES #4702, SHS #3849, DSA #1244, DRBG #1600
|
129 | ForeScout 190 West Tasman Drive San Jose, CA 95134 USA
Ayelet Kutner cavp@forescout.com
| BC-FJA (Bouncy Castle FIPS Java API) 1.0.0
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. | - Intel Celeron J1900 w/ CentOS 6.6
| 8/4/2017 | - KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3827, DSA #1239, DRBG #1580
|
128 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations 10.0.15063
The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
- AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
| 7/28/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3790, ECDSA #1135, DRBG #1556
|
127 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations 10.0.15063
The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications. | - Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
- Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
- Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
- Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
- Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
- Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
- Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
- Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
- AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
- Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
| 7/21/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3790, ECDSA #1133, DRBG #1555
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3790, DSA #1223, DRBG #1555
|
126 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN9000 Series Common Crypto Library 3.0.1 (Firmware)
The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 6/21/2017 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3734, ECDSA #1111, DRBG #1506
|
125 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN6000 Series Common Crypto Library 3.0.1 (Firmware)
The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 6/21/2017 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3733, ECDSA #1110, DRBG #1505
|
124 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA 312 Kings Way South Melbourne, Victoria 3205 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN8000 Series Common Crypto Library 3.0.1 (Firmware)
The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 6/21/2017 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3732, ECDSA #1109, DRBG #1504
|
123 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library 3.0.1 (Firmware)
The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 6/21/2017 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3731, ECDSA #1108, DRBG #1503
|
122 | Amazon Web Services, Inc. 410 Terry Ave N Ste 1200 Seattle, WA 98109-5210 USA
Kelvin Yiu kelvinyi@amazon.com
Ken Beer nbeer@amazon.com
| AWS Key Management Service Cryptographic Algorithm Library 1.0.0 (Firmware)
The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module. | | 6/9/2017 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: K-233
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: AES #4527, SHS #3708, ECDSA #1102, DRBG #1487, HMAC #2987
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: AES #4527, SHS #3708, DSA #1206, DRBG #1487
|
121 | VT iDirect 13681 Sunrise Valley Drive, Suite 300 Herndon, VA 20171 USA
Chris Gormont CGormont@idirectgov.com 703.880.6257
| iDirect Cloak Algorithm Module 1.0 1.0.2.0 (Firmware)
VT iDirect, Inc's firmware cryptographic library provides all cryptographic operations for the support of iDirect's Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data. | | 5/12/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3698, ECDSA #1096, DRBG #1473
|
120 | Ciena Corporation 7035 Ridge Road Hanover, MD 21076 USA
Kevin Meagher KMeagher@ciena.com
| Ciena 8700 Packetwave Platform 8.5
The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch. | - NXP QorIQ P4080 w/ SAOS 8.5
| 4/21/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3682, ECDSA #1092, DRBG #1454
|
119 | Trustonic 20 Station Road Cambridge CB1 2JD UK
Alec Edgington alec.edgington@trustonic.com +44 1223 347864
Mark Wooding mark.wooding@trustonic.com +44 1223 3478534
| TRICX 1.0
TRICX is a static library providing an extensive suite of FIPS-approved cryptographic algorithms and supporting a range of key sizes and modes. | - ARM Cortex-A53 without PAA w/ Trustonic Kinibi 400A
- ARM Cortex-A53 with PAA w/ Trustonic Kinibi 400A
| 4/21/2017 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3680, ECDSA #1090, DRBG #1450
|
118 | Silver Spring Networks 230 W Tasman Drive San Jose, CA 95134 USA
Jeff Ebert jebert@ssni.com 16697704000 Fax: 18667760015
| Silver Spring Networks Endpoint Security Module 130-0117-01.ESM 82136+98519 (Firmware)
Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products. | - ESM instruction manager processor embedded in SSN ARNIE SoC
| 4/14/2017 | - KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3677, DSA #1194, DRBG #1448
|
117 | INTEGRITY Security Services (ISS) 7585 Irvine Center Driver Suite 250 Irvine, California 91618 USA
David Sequino dsequino@ghs.com 206-310-6795 Fax: 978-383-0560
Douglas Kovach dkovach@ghs.com 727-781-4909 Fax: 727-781-2915
| Crestron Control Engine 3.0 (Firmware)
Porting of the ISS Embedded Cryptographic Toolkit (ECT) to the Crestron Control Engine. | | 3/31/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3658, ECDSA #1080, DRBG #1437
- KAS FFC:
- Functions: Full Public Key Validation, Partial Public Key Validation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #3658, DRBG #1437
|
116 | Aruba, a Hewlett Packard Enterprise company 1344 Crossman Avenue Sunnyvale, CA 94089 USA
Steve Weingart fips@arubanetworks.com 512-319-2480 Fax: 408-227-4500
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 3/31/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2630, ECDSA #581, DRBG #660
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: DSA #1190
|
115 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Gokul Karthik Balaswamy gokulk@microsoft.com 425-706-8583 Fax: 425-708-0107
Christine Ahonen chrisah@microsoft.com 425-706-8675 Fax: 425-936-7329
| Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) 7.00.2872
The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces. | - Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
- Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
- NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
- Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
- Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
| 3/31/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3649, DSA #1188, DRBG #1430
- KAS FFC:
- Functions: Domain Parameter Validation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3649, DSA #1188, DRBG #1430
|
114 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Gokul Karthik Balaswamy gokulk@microsoft.com 425-706-8583 Fax: 425-708-0107
Christine Ahonen chrisah@microsoft.com 425-706-8675 Fax: 425-936-7329
| Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) 8.00.6246
The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces. | - Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
- MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
| 3/24/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3648, ECDSA #1072, DRBG #1429
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3648, DSA #1187, DRBG #1429
|
113 | Attivo Networks, Inc. 47697 Westinghouse Drive, Suite 201 Fremont, CA 94539 USA
Satya Das 510 623-1000
| Attivo Cryptographic Provider 1.0 (Firmware)
Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics. | - Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
- Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
| 3/6/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3638, ECDSA #1070, DRBG #1426, HMAC #2933
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #3638, DSA #1185, DRBG #1426
|
112 | Secusmart GmbH Heinrichstrasse 155 Düsseldorf, NRW 40239 Germany
Thomas Schetelig thomas.schetelig@secusmart.com +49211447399701
Markus Hauenstein markus.hauenstein@secusmart.com +49211447399157
| SecuSUITE Client OpenSSL FIPS Object Module 2.0.12
SecuSUITE Client OpenSSL FIPS Object Module | - Samsung Exynos 8890 w/ Android 6.0.1
- Qualcomm MSM8960 w/ BlackBerry OS 10.3.3
- Qualcomm MSM8974 w/ BlackBerry OS 10.3.3
| 2/3/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Prerequisite: SHS #3610, ECDSA #1046, DRBG #1408
|
111 | Aruba, a Hewlett Packard Enterprise company 1344 Crossman Avenue Sunnyvale, CA 94089 USA
Steve Weingart fips@arubanetworks.com 512-319-2480 Fax: 408-227-4500
| ArubaOS Crypto Module 6.5.1-FIPS (Firmware)
The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. | | 1/27/2017 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2246, ECDSA #1042, DRBG #466
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2246, DSA #1167, DRBG #433
|
110 | ST Microelectronics (Protonworld) Green Square Building B, Lambroekstraat 5 Diegem/Machelen B-1831 Belgium
Olivier COLLART olivier.collart@st.com +32 272 450 77 Fax: +32 272 451 43
Fabien ARRIVE fabien.arrive@st.com +33 223 470 633 Fax: +33 223 470 400
| ST33TPHF2ESPI ST33HTPH2E28AAF1
ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications. | | 1/13/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3539, ECDSA #1025, DRBG #1361
|
109 | ST Microelectronics (Protonworld) Green Square Building B, Lambroekstraat 5 Diegem/Machelen B-1831 Belgium
Olivier COLLART olivier.collart@st.com +32 272 450 77 Fax: +32 272 451 43
Fabien ARRIVE fabien.arrive@st.com +33 223 470 633 Fax: +33 223 470 400
| ST33TPHF2EI2C ST33HTPH2E28AHA8
ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications. | | 1/13/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3539, ECDSA #1025, DRBG #1361
|
108 | ST Microelectronics (Protonworld) Green Square Building B, Lambroekstraat 5 Diegem/Machelen B-1831 Belgium
Olivier COLLART olivier.collart@st.com +32 272 450 77 Fax: +32 272 451 43
Fabien ARRIVE fabien.arrive@st.com +33 223 470 633 Fax: +33 223 470 400
| ST33TPHF20SPI ST33HTPH2028AAF3
ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 2.0 specification. | | 1/13/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3539, ECDSA #1025, DRBG #1361
|
107 | ST Microelectronics (Protonworld) Green Square Building B, Lambroekstraat 5 Diegem/Machelen B-1831 Belgium
Olivier COLLART olivier.collart@st.com +32 272 450 77 Fax: +32 272 451 43
Fabien ARRIVE fabien.arrive@st.com +33 223 470 633 Fax: +33 223 470 400
| ST33TPHF20I2C ST33HTPH2E28AHA9
ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 2.0 specification. | | 1/13/2017 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3539, ECDSA #1025, DRBG #1361
|
106 | Infineon Technologies AG Alter Postweg 101 Augsburg, BY 86159 Germany
Roland Ebrecht Roland.Ebrecht@infineon.com +49-821-25851-68 Fax: +49-821-25851-40
Thomas Hoffmann Thomas.Hoffmann@infineon.com +49-821-25851-24 Fax: +49-821-25851-40
| Trusted Platform Module 2.0 SLB 9670 SLB 9670 7.80 (Firmware)
Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group. | - Infineon SLB 9670 security controller IC
| 12/23/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3555, ECDSA #1021, DRBG #1375
|
105 | Infineon Technologies AG Alter Postweg 101 Augsburg, BY 86159 Germany
Roland Ebrecht Roland.Ebrecht@infineon.com +49-821-25851-68 Fax: +49-821-25851-40
Thomas Hoffmann Thomas.Hoffmann@infineon.com +49-821-25851-24 Fax: +49-821-25851-40
| Trusted Platform Module 2.0 SLB 9660, SLB 9665 SLB 9660/9665 5.80 (Firmware)
Infineon Trusted Platform Module 2.0 SLB 9660/ SLB 9665 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group. | - Infineon SLB 9660 or SLB 9665 security controller IC
| 12/23/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #3554, ECDSA #1020, DRBG #1374
|
104 | Certicom Corp. 4701 Tahoe Blvd, Building A, 5th Floor Missisauga, ON L4W 0B5 Canada
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-508-4230
| Security Builder FIPS Core 5.6.2
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based applications for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec, SSL and DRM modules. | - Qualcomm Snapdragon 801 w/ BlackBerry 10
- Qualcomm Snapdragon S4 w/ BlackBerry 10
- Qualcomm Snapdragon S4 Pro w/ BlackBerry 10
| 12/23/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3547, ECDSA #1017, DRBG #1370
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3547, DSA #1147, DRBG #1370
|
103 | Distech Controls, Inc. 4205 Place de Java Brossard, QC J4Y 0C4 Canada
Dominic Gagnon dgagnon@distech-controls.com 450-444-9898 Ext.231 Fax: 450-444-0770
François Gervais fgervais@distech-controls.com 450-444-9898 Ext.263 Fax: 450-444-0770
| Distech Java Cryptographic Library 1.0 (Firmware)
The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers. | - AM335x Cortex-A8 (ARMv7) /w NEON
| 12/23/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3545, ECDSA #1014, DRBG #1367, HMAC #2842
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #3545, DSA #1146, DRBG #1367
|
102 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library 3.0.0 (Firmware)
The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 12/23/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3542, ECDSA #1013, DRBG #1364, HMAC #2839
|
101 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA 312 Kings Way South Melbourne, Victoria 3205 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN8000 Series Common Crypto Library 3.0.0 (Firmware)
The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 12/23/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3541, ECDSA #1012, DRBG #1363
|
100 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN6000 Series Common Crypto Library 3.0.0 (Firmware)
The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 12/23/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3540, ECDSA #1011, DRBG #1362
|
99 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.0
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - NXP ARM Cortex-A9 w/ Android OS API Level 17
| 12/23/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3538, ECDSA #1010, DRBG #1360
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3538, DSA #1143, DRBG #1360
|
98 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto Core 2.9.0
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
| 12/23/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: CCM
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: CCM
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3537, ECDSA #1009, DRBG #1359
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator
- Parameter Sets:
- Prerequisite: SHS #3537, DSA #1142, DRBG #1359
|
97 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Eric Betts betts@vmware.com 408-891-0590
Michael McKay mmckay@vmware.com 408-891-0590
| VMware Java JCE (Java Cryptographic Extension) Module BC FIPS 1.0.0
The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions. | - Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
| 12/16/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3490, ECDSA #993, DRBG #1330, HMAC #2788
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM/CMAC/HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #3490, DSA #1139, DRBG #1330
|
96 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Eric Betts betts@vmware.com 408-891-0590
Michael McKay mmckay@vmware.com 408-891-0590
| VMware Java JCE (Java Cryptographic Extension) Module BC FIPS 1.0.0
The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions. | - Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
| 12/2/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3417, ECDSA #955, DRBG #1261, HMAC #2721
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM/HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #3417, DSA #1127, DRBG #1261
|
95 | General Dynamics Mission Systems 150 Rustcraft Road Dedham, MA 02026 USA
Certification Director fortressinfo@gd-ms.com 770-689-2040 Fax: 781-455-5555
| Fortress KAS Implementation 2.0 (Firmware)
The Fortress KAS Implementation suite works in unison to provide security to your wireless and wired networks. | - RMI Alchemy MIPS Processor
| 10/28/2016 | - KAS ECC:
- Functions: Domain Parameter Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #1357, DRBG #66
- KAS FFC:
- Functions: Full Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1357, DRBG #66
|
94 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN9000 Series Common Crypto Library 3.0.0 (Firmware)
The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 10/14/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3391, ECDSA #937, DRBG #1242
|
93 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Tim Myers FIPS@microsoft.com 800-Microsoft
| Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations 10.0.14393
The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V | - Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro Anniversary Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Datacenter (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Storage Server 2016 (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Server 2016 with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
| 9/9/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3347, ECDSA #920, DRBG #1222
|
92 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Tim Myers FIPS@microsoft.com 800-Microsoft
| Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations 10.0.14393
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
- Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface 3 w/ Windows 10 Anniversary Update (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro Anniversary Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x86)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro Anniversary Update (x86)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Anniversary Update (x86)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Anniversary Update (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Datacenter (x64)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Storage Server 2016 (x64)
- Qualcomm Snapdragon 808 (A57, A53) w/Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
- Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
- Qualcomm Snapdragon 820 (Kryo) w/ Windows 10 Mobile Anniversary Update (ARMv7)
- Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Anniversary Update (ARMv7)
- Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
| 8/24/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3347, DSA #1098, ECDSA #911, DRBG #1217, HMAC #2651
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3347, DSA #1098, DRBG #1217
|
91 | HID Global Corporation 6623 Dumbarton Circle Fremont, CA 94555 USA
Jean-Luc Azou jlazou@hidglobal.com 510-574-1738 Fax: 510-574-0100
Béatrice SALAUN bsalaun@hidglobal.com + 33 1 42 04 84 56
| KAS ECC OnePassDH 2.7.4.12 (Firmware)
KAS ECC OnePassDH component implements ECC OnePassDH Key Agreement with Key Confirmation (Key Agreement Role Responder - Key Confirmation Role Provider and Type Unilateral). Supported cryptographic suite: EC: P-256 / SHA256 / CMAC | - Oberthur: Hardware version 'OF', Firmware version '5601'
- Giesecke & Devrient: Infineon SLE 78CLFXxxxxP Dual-Interface/Contactless Security Controller
- Gemalto: NXP SmartMX2 P60 chip family
| 8/24/2016 | - KAS ECC:
- Functions: Full Public Key Validation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Key Confirmation:
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CMAC
- Prerequisite: SHS #2449, ECDSA #526, DRBG #537
|
90 | Attivo Networks, Inc. 47697 Westinghouse Drive, Suite 201 Fremont, CA 94539 USA
Satya Das 510 623-1000
| Attivo Cryptographic Provider 1.0
Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics. | - Intel(R) Xeon(R) CPU E5-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
| 8/12/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3339, ECDSA #908, DRBG #1213, HMAC #2644
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- Prerequisite: SHS #3339, DSA #1095, DRBG #1213
|
89 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS .NET API 1.0.1
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. | - Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
- Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
- Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
- Intel Atom w/ Windows 10 Professional 64 bit
| 8/4/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3312, ECDSA #894, DRBG #1194
|
86 | Apricorn, Inc. 12191 Kirkham Rd Poway, CA 92064 United States
Robert Davidson rdavidson@apricorn.com 858-513-4430 Fax: 858-513-4404
| Aegis Translator Configurator 7.0 (Firmware)
Secure communication for Aegis device setup | | 7/31/2016 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #1911, ECDSA #919, DRBG #260
|
85 | Information Security Corporation 1011 Lake St. Suite 425 Oak Park, IL 60118 USA
Jonathan Schulze-Hewett schulze-hewett@infoseccorp.com 708-445-1704 Fax: 708-445-9705
Michael Markowitz markowitz@infoseccorp.com 708-445-1704 Fax: 708-445-9705
| ISC Cryptographic Development Kit (CDK) 8.0
The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions. | - AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
- Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
- Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
| 7/31/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3307, ECDSA #892, DRBG #1192
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #3307, DSA #1090, DRBG #1192
|
83 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto core Intel Xeon 2.9.0
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - n/a w/ CentOS Linux 7.0 64 bit with Oracle JRE 1.8.0
| 6/10/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: K-283
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3292, ECDSA #884, DRBG #1180
- KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3292, DSA #1084, DRBG #1180
|
82 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN6000 Series Common Crypto Library 2.7.1 (Firmware)
The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 5/27/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
|
81 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN4010, CN4020 and CN6010 Series Common Crypto Library 2.7.1 (Firmware)
The CN4010, CN4020 and CN6010 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN4010, CN4020 and CN6010 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services. | | 5/27/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3282, ECDSA #876, DRBG #1170
|
80 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN8000 Series Common Crypto Library 2.7.1 (Firmware)
The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 5/27/2016 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3281, ECDSA #875, DRBG #1169
|
79 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.0.3
Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec and SSL modules. | - Intel Core i7-3615QM w/ Mac OS X El Captian 10.11.4
| 4/22/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3256, ECDSA #866, DRBG #1151
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3256, DSA #1076, DRBG #1151
|
78 | AlpCode AS Postboks 6 Folldal N-2581 Norway
Dag Arne Osvik contact@alpcode.com +47 40699784
| AlpCode™ Cryptographic Library (ACCL) 2
AlpCode™ Cryptographic Library (ACCL) features side-channel resistance through its use of constant-time algorithms, data-independent memory access patterns and fault detection. Its unique side-channel resistance even extends to normally-public elliptic-curve parameters, making it suitable for use with classified elliptic curves. | | 4/15/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3246, ECDSA #863, DRBG #1144, HMAC #2559
|
77 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS .NET API 1.0.0
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. | - Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
- Intel Atom w/ Windows 10 Professional 64 bit
- Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
- Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
| 3/25/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3326, ECDSA #856, DRBG #1130
|
76 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA
David Suksumrit david.suksumrit@viasat.com 760-476-2306 Fax: 760-929-3941
Savitha Naik savitha.naik@viasat.com 760-476-7416 Fax: 760-929-3941
| EbemCrypto Version 12 (Firmware)
Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in ViaSat's Enhanced Bandwidth Efficient Modem (EBEM). | | 2/26/2016 | - KAS ECC:
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #3201, ECDSA #839, DRBG #1107
|
75 | SPYRUS Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
William Sandberg-Maitland SMAITLAND@spyrus.com 408-392-9131 Fax: 408-392-0319
Jack Young jyoung@spyrus.com 408-392-9131 Fax: 408-392-0319
| P384 Firmware 03.00.0D (Firmware)
AES Library implements all keys sizes in the firmware and supports ECB, CBC and XTS. SHA2 Library implements SHA224, 256, 384 and 512 in the firmware. ECCLib implements ECDSA and ECDH for P256, P384 and P521. HRNG implements the hash DRBG using SHA512. | - ARM9 Vendor NXP Part No. LPC3131
| 2/19/2016 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM/CMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3198, DRBG #1106
|
74 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.0.3
Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec and SSL modules | - Intel Core i7-3615QM w/ Mac OSX Yosemite 10.10.4
| 1/22/2016 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3164, ECDSA #828, DRBG #1085
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3164, DSA #1049, DRBG #1085
|
73 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS Java API 1.0.0
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. | - Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6
- Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6
- Intel Xeon E5-2697 V3 w/ Ubuntu 14.04 LTS on VMWare ESXi 6.0
| 12/18/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3126, ECDSA #804, DRBG #1031, HMAC #2458
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- MQV2:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- MQV1:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral, Unilateral
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
|
72 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Tim Myers FIPS@microsoft.com 800-Microsoft
| Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations 10.0.10586
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November 2015 Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November 2015 Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November 2015 Update (x64)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November 2015 Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November 2015 Update (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November 2015 Update (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x86)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro November 2015 Update (x86)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 November 2015 Update (x86)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise November 2015 Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro November 2015 Update (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 November 2015 Update (x64)
- Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise November 2015 Update (x64)
- Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile
- Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Hub 84" w/ Windows 10 for Surface Hub (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 for Surface Hub (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November 2015 Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Enterprise November 2015 Update (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November 2015 Update (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Pro November 2015 Update (x64)
| 12/4/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #3047, ECDSA #760, DRBG #955
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #3047, DSA #1024, DRBG #955
|
71 | INSIDE Secure Arteparc Bachasson, Bât A Rue de la carrière de Bachasson, CS70025 Meyreuil, Bouches-du-Rhône 13590 France
Euan Macdonald emacdonald@insidesecure.com +44 1355 803019 Fax: +44 1355 572978
Jean Fioretti jfioretti@insidesecure.com +33 442 370095 Fax: +33 442 370198
| VaultIC405 VaultIC405M Rev B 1.2.1 (Firmware)
VaultIC (R) are security modules designed to secure applications such as anti-cloning, physical access control, personal access control for multimedia and web applications, hardware authentication, user strong authentication, SSL support, PKCS#11 to Microsoft (R) CSP applications, PKI, DRM, trusted computing and IP protection. | | 11/6/2015 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2948, ECDSA #729, DRBG #922
|
70 | Century Longmai Technology Co. Ltd 3rd Floor, Gongkong Building No. 1 Wangzhuang Rd Haidian District Beijing 100083 China
Lemon Yang Lemon.yang@longmai.net 86 13810314817 Fax: 86 10 62313636
| mToken CryptoID SCC-X
mToken CryptoID is designed based on a secure smartcard chip that utilizes the in-built mCOS to communicate with computer device via USB interface in a "plug and play" manner. It can realize various Public Key Infrastructure (PKI) applications including digital signature, online authentications, online transactions, software security, etc. | | 11/6/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2944, ECDSA #728, DRBG #921
|
69 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA
Steven Ruggieri sruggi01@harris.com 585-239-7806 Fax: 585-241-8159
Suzanne Kwak skwak@harris.com 585-242-4686 Fax: 585-241-8159
| Harris Broadband Ethernet Radio GPP Cryptographic Library 4.10a (Firmware)
This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x. | | 11/6/2015 | - KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2943, DSA #994, DRBG #920
|
68 | GOTrust Technology Inc. 10F-1, No.306, Sec. 1, Wenxin Rd., Nantun Dist. Taichung City 408 Taiwan
Jerry Lin jerrylin@go-trust.com +886-4-23202525 Fax: +886-4-23202580
| GO-Trust Cipher Library 2.0 (Firmware)
The GO-Trust Cipher Library is designed to provide FIPS140-2 algorithm support for the GO-Trust SDencrypter Cryptographic Module. This module supports GO-Trust applications (for example: KingCall and KingText) by providing validated Cryptographic Services. The incorporation of these algorithms makes these products ideal for enterprise and governmen | | 10/16/2015 | - KAS ECC:
- Functions: Domain Parameter Validation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #1672, ECDSA #723, DRBG #902
- KAS FFC:
- Functions: Domain Parameter Validation
- Schemes:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1672, DSA #996, DRBG #902
|
67 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park 300 Taiwan, R.O.C.
Yossi Talmi yossi.talmi@nuvoton.com +972-9-9702364 Fax: +972-9-9702001
Oren Tanami oren.tanami@nuvoton.com +972-9-9702390 Fax: +972-9-9702001
| Nuvoton NPCT6xx TPM 2.0 Cryptographic Engine FB5C85E
Nuvoton TPM (Trusted Platform Module), a TCG 2.0 compliant security processor with embedded firmware | | 10/9/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM/HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM/HMAC
- Prerequisite: SHS #2920, ECDSA #720, DRBG #899
|
66 | Nuvoton Technology Corporation No. 4, Creation Rd. III Hsinchu Science Park 300 Taiwan, R.O.C.
Yossi Talmi yossi.talmi@nuvoton.com +972-9-9702364 Fax: +972-9-9702001
Oren Tanami oren.tanami@nuvoton.com +972-9-9702390 Fax: +972-9-9702001
| Nuvoton NPCT6xx TPM 2.0 Cryptographic Engine FB5C85D
Nuvoton TPM (Trusted Platform Module), a TCG 2.0 compliant security processor with embedded firmware | | 10/9/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CCM
|
65 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA
Steven Ruggieri sruggi01@harris.com 585-239-7806 Fax: 585-241-8159
Suzanne Kwak skwak@harris.com 585-242-4686 Fax: 585-241-8159
| Harris Broadband Ethernet Radio GPP Cryptographic Library 4.10 (Firmware)
This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products: RF-7800-OU50x/-OU47x/-OU49x. | | 9/30/2015 | - KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2911, DSA #989, DRBG #887
|
64 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Tim Myers FIPS@microsoft.com 800-Microsoft
| Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations 10.0.10240
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 (x86)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise (x64)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise (x86)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro (x64)
- Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro (x64)
- Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro (x64)
- Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro (x86)
- Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface 3 w/ Windows 10 Enterprise (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3
- AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB (x64)
- Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB (x86)
| 8/29/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2886, ECDSA #706, DRBG #868
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2886, DSA #983, DRBG #868
|
63 | Redline Communications, Inc. 302 Town Centre Blvd., 4th Floor Markham, Ontario L3R OE8 Canada
Andrew Spurgeon aspurgeon@rdlcom.com 905-479-8344 x2471
Weixiong Lin wlin@rdlcom.com 905-479-8344 x2372
| RDL-3000 Elliptic Curve Cryptographic Suite 3.1 (Firmware)
Implements ECC-based certificate device authentication, used by RDL-3000 systems to validate the identities of the devices at either end of a wireless connection. | | 7/17/2015 | - KAS ECC:
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Parameter Sets:
- Prerequisite: SHS #2867, ECDSA #703, DRBG #854
|
62 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto core 2.8.8
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Intel Xeon w/ CentoOS Linux 7.0 64 bit with Oracle JRE 1.8.0
| 7/17/2015 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2860, ECDSA #702, DRBG #852
|
61 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder GSE-J Crypto core 2.8.8
Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. | - Intel Xeon w/ CentoOS Linux 7.0 64 bit with Oracle JRE 1.8.0
| 7/17/2015 | - KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2860, DSA #978, DRBG #852
|
60 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA
David Suksumrit david.suksumrit@viasat.com 760-476-2306 Fax: 760-929-3941
Savitha Naik savitha.naik@viasat.com 760-476-7416 Fax: 760-929-3941
| EbemCrypto 11 (Firmware)
Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in ViaSat's Enhanced Bandwidth Efficient Modem (EBEM-500). | | 7/2/2015 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- KAS FFC:
- Functions: Full Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
|
59 | Dell Software, Inc. 5455 Great America Parkway Santa Clara, CA 95051 USA
Usha Sanagala usanagala@sonicwall.com 408-962-6248 Fax: 408-745-9300
| SonicOS 6.2.1 for SM9800 6.2.1 (Firmware)
The Dell(tm) SonicWALL(tm) SuperMassive(tm) Series is Dell's next-generation firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency. | - Cavium Octeon II CN 6640-8core
| 5/22/2015 | - KAS ECC:
- Functions: Domain Parameter Validation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2816, ECDSA #661, DRBG #815
|
58 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN6000 Series Common Crypto Library 2.6.1 (Firmware)
The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services. | | 4/17/2015 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2772, ECDSA #661, DRBG #779
|
57 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN1000 and CN3000 Series Common Crypto Library 4.6.1 (Firmware)
The CN1000 and CN3000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN1000 and CN3000 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services. | | 4/17/2015 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2771, ECDSA #660, DRBG #778
|
56 | Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) 312 Kings Way South Melbourne, Victoria 3025 Australia
John Weston john.weston@senetas.com +61 3 9868 4555 Fax: +61 3 9821 4899
| CN4010 and CN6010 Series Common Crypto Library 2.6.1 (Firmware)
The CN4010 and CN6010 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN4010 and CN6010 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services. | | 4/17/2015 | - KAS ECC:
- Functions: Domain Parameter Validation, Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2770, ECDSA #659, DRBG #777
|
55 | United States Special Operations Command (USSOCOM) 7701 Tampa Point Boulevard MacDill Air Force Base, Florida 33621-5323 USA
William W. Burnham william.burnham@socom.mil (813) 826-2282
| Suite B Cryptographic Algorithms 2.0
KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Federal Information Processing Standard (FIPS) 140-2 certified, standards-based Suite B Cryptographic Algorithms library that provides an advanced layer of encrypted data-in-transit communications and data-at-rest encryption for the BlackBerry ecosystem. | - Qualcomm Snapdragon S2 w/ BlackBerry OS v7.1
- Qualcomm Snapdragon S4 w/ BlackBerry OS v10.3
- Intel Xeon w/ Microsoft Windows Server 2008 R2 (64-bit)
- Intel Xeon w/ Microsoft Windows Server 2012 R2 (64-bit)
- Qualcomm Snapdragon 801 w/ BlackBerry OS v10.3
| 4/10/2015 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2761, ECDSA #657, HMAC #2119
|
54 | ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 USA
David Suksumrit david.suksumrit@viasat.com 760-476-2306 Fax: 760-929-3941
Savitha Naik savitha.naik@viasat.com 760-476-7416 Fax: 760-929-3941
| EbemCrypto EbemCrypto Version 10 (Firmware)
Implements authentication, key negotiation/generation, and controls FPGA implementation of traffic encryption in ViaSat's Enhanced Bandwidth Efficient Modem (EBEM-500). | | 3/6/2015 | - KAS ECC:
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #2691, ECDSA #611, DRBG #714
|
53 | Cavium, Inc. 2315 N. First Street San Jose, CA 95131 USA
Tejinder Singh Tejinder.Singh@caviumnetworks.com 408-943-7403 Fax: 408-577-1992
Phanikumar Kancharla Pkkancharla@caviumnetworks.com 408-943-7496
| Cavium Cloning 1.0.0 (Firmware)
This module uses ECC based key agreement scheme to generate a shared key on two Cavium HSMs. Uses Nonces and mac based key confirmation. | - Cavium Octeon Family, CN61XX
| 2/13/2015 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2652, ECDSA #589, DRBG #680
|
52 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
William Sandberg-Maitland smaitland@spyrus.com 613-298-3426
| SPYCOS 3.0 742100004F 3.0 (Firmware)
SPYCOS 3.0 is a hardware cryptographic module that enables security critical capabilities such as user authentication, message privacy, integrity and secure storage in rugged, tamper-evident QFN and microSD form factors. The SPYCOS 3.0 Module communicates with a host computer via the standard USB interface. | | 12/24/2014 | - KAS ECC:
- Functions: Domain Parameter Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2529
|
51 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Langley Rock Langley.Rock@safenet-inc.com 613.221.5068 Fax: 613.723.5079
Laurie Mack Laurie.Mack@safenet-inc.com 613.221.5065 Fax: 613.723.5079
| ProtectServer Internal Express Cryptographic Library 5 (Firmware)
The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 11/7/2014 | - KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
- Schemes:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #2576, DSA #902
|
50 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.0.2.1
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec SSL and IPSec and SSL modules. | - Intel Core i7-2720QM w/ AES-NI w/ Windows 7 Enterprise 64-bit
- ARMv7 w/ Windows Phone 8.0
- Intel Atom CPU Z2460 w/ Android 4.0.4
- ARMv7 w/ iOS version 6.1.4
- Intel Xeon with AES-NI w/ Windows 7
- Intel Xeon E5620 with AES-NI w/ CentOS Linux Release 7.1 64-bit
- Intel Core i7-3615QM w/ Mac OS X Yosemite 10.10.4
| 10/16/2014 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2530, ECDSA #553,
RNG #1310, DRBG #579
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2530, DSA #891,
RNG #1310, DRBG #579
|
49 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA
Dave Riley dave.riley@pb.com 203-796-3208
| libkas MAX32590 Rev B4 01.01.0008 (Firmware)
Pitney Bowes X4 HSM Cryptographic Module | | 8/11/2014 | - KAS ECC:
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: ECDSA #529
|
48 | Oberthur Technologies 402 rue d'Estienne d'Orves Colombes 92700 France
GOYET Christophe c.goyet@oberthur.com +1 703 322 8951
BOUKYOUD Saïd s.boukyoud@oberthur.com +33 1 78 14 72 58 Fax: +33 1 78 14 70 20
| ECC CDH on Cosmo V8 0F 07837.9 (Firmware)
ID-One Cosmo V8 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.1 and GlobalPlatform 2.2.1 chip which support ECC CDH both for in module key establishment and for primitive only as required by PIV. | | 7/31/2014 | - KAS ECC:
- Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
- Schemes:
- One Pass DH:
- Key Agreement Roles: Responder
- Key Confirmation:
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: CMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: CMAC
- Prerequisite: SHS #3379, ECDSA #933, DRBG #1234
|
47 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Mike Grimm FIPS@microsoft.com 800-Microsoft
| Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations 6.3.9600
The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography. | - NVIDIA Tegra 4 Quad-Core w/ Microsoft Surface 2 w/ Windows RT 8.1 (ARMv7 Thumb-2)
- NVIDIA Tegra 3 Quad-Core w/ Windows RT 8.1 (ARMv7 Thumb-2)
- Qualcomm Snapdragon S4 w/ Windows Phone 8.1 (ARMv7 Thumb-2)
- Qualcomm Snapdragon 400 w/ Windows Phone 8.1 (ARMv7 Thumb-2)
- Windows Phone 8.1 (ARMv7 Thumb-2) w/ Windows Phone 8.1 (ARMv7 Thumb-2)
- Qualcomm Snapdragon S4 w/ Windows RT 8.1 (ARMv7 Thumb-2)
- NVIDIA Tegra 3 Quad-Core w/ Microsoft Surface w/ Windows RT 8.1 (ARMv7 Thumb-2)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64)
- Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x86)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows 8.1 Enterprise (x86)
- Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x86)
- Intel Pentium without AES-NI w/ Microsoft Windows 8.1 Enterprise (x86)
- Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86)
- Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86)
- Intel Pentium without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows 8.1 Enterprise (x64)
- Intel Pentium without AES-NI w/ Microsoft Windows 8.1 Enterprise (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64)
- Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64)
- Intel Pentium without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64)
- Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64)
- AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64)
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Server 2012 R2 (x64)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Server 2012 R2 (x64)
- Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Server 2012 R2 (x64)
- Intel Pentium without AES-NI w/ Microsoft Windows Server 2012 R2 (x64)
- AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64)
- AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Storage Server 2012 R2 (x64)
- Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64)
- Intel Pentium without AES-NI w/ Microsoft Windows Storage Server 2012 R2 (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Microsoft Windows 8.1 Enterprise (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro w/ Windows 8.1 Pro (x64)
- Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Windows 8.1 Pro (x64)
- Intel Xeon E5-2648L without AES-NI w/ Microsoft StorSimple 8100 w/ Microsoft Windows Server 2012 R2
- Intel Xeon E5-2648L with AES-NI w/ Microsoft StorSimple 8100 w/ Microsoft Windows Server 2012 R2
- Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 8.1 Pro (x64)
- Intel Xeon with AES-NI w/ Azure StorSimple Virtual Array Windows Server 2012 R2 on Hyper-V 6 on Windows Server 2012 R2 (x64)
- Intel Core i7 with AES-NI w/ Azure StorSimple Virtual Array Windows Server 2012 R2 on VMware Workstation 12 on Windows Server 2012 R2 (x64)
- Qualcomm Snapdragon 800 w/ Windows Phone 8.1 (ARMv7 Thumb-2)
- Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
- Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
- Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
| 7/10/2014 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2373, ECDSA #505, DRBG #489
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2373, DSA #855, DRBG #489
|
46 | INSIDE Secure Arteparc Bachasson, Bât A Rue de la carrière de Bachasson, CS70025 Meyreuil, Bouches-du-Rhône 13590 France
Bob Oerlemans boerlemans@insidesecure.com +31 736-581-900 Fax: +31 736-581-999
| VaultIP 1.1
VaultIP is a Silicon IP Security Module which includes a complete set of high- and low-level cryptographic functions. It offers key management and crypto functions needed for platform and application security such as Content Protection and Mobile Payment, and can be used stand-alone or as a 'Root of Trust' to support a TEE-based platform. | | 5/23/2014 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: ASN.1, Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #2389, ECDSA #502, DRBG #500
|
45 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA
Dave Riley dave.riley@pb.com 203-796-3208
| libkas MAX32590 Rev B4 01.01.0008 (Firmware)
Pitney Bowes X4 HSM Cryptographic Module | | 4/9/2014 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #2369, ECDSA #495, DRBG #487
|
44 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Chris Brych Chris.Brych@safenet-inc.com 613.221.5081 Fax: 613.723.5079
Laurie Smith Laurie.Smith@safenet-inc.com 613.221.5026 Fax: 613.723.5079
| Luna G5 Cryptographic Library 6.10.4 (Firmware)
The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx PowerPC (PPC440EPx) Embedded Processor
| 11/8/2013 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2241, ECDSA #464, DRBG #428
|
43 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Chris Brych Chris.Brych@safenet-inc.com 613.221.5081 Fax: 613.723.5079
Laurie Smith Laurie.Smith@safenet-inc.com 613.221.5026 Fax: 613.723.5079
| Luna K6 Cryptographic Library 6.10.4 (Firmware)
The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 11/8/2013 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2240, ECDSA #462, DRBG #428
|
42 | BlackBerry 295 Phillip Street Waterloo, ON N2L3W8 Canada
Security Certifications Team certifications@blackberry.com 519-888-7465x72921 Fax: 905-507-4230
| BlackBerry Cryptographic Algorithm Library 6.1
The BlackBerry Cryptographic Algorithm Library is a suite of cryptographic algorithms that provides advanced cryptographic functionality to systems running BlackBerry 10 OS and components of BlackBerry Enterprise Service 10. | - Intel Xeon X5650 w/ CentOS 5.5 Linux 32-bit
- Intel Xeon X5650 w/ CentOS 5.5 Linux 64-bit
- Intel Xeon X5650 w/ Windows XP 32-bit
- Intel Xeon X5650 w/ Windows XP 64-bit
- ARMv7 w/ QNX Neutrino 8.0
| 9/30/2013 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-256MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2207, ECDSA #455,
RNG #1245, DRBG #406
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2207, DSA #795,
RNG #1245, DRBG #406
|
41 | Harris Corporation 1680 University Avenue Rochester, NY 14610 USA
Robert Magnant rmagnant@harris.com 585-242-3785 Fax: 585-241-8459
Elias Theodorou rmagnant@harris.com 585-242-3785 Fax: 585-241-8459
| RF-7800W OU47x, OU49x, OU50x 2.00 (Firmware)
This is a firmware library that provides the cryptographic functions used on Harris' industry leading reliable, secure and high performance Broadband Ethernet Radio (BER) products: RF-7800W-OU50x, -OU47x, -OU49x. | | 8/29/2013 | - KAS FFC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #2190, DSA #791, DRBG #398
|
40 | FRAMA AG Unterdorf Lauperswil, Bern CH-3438 Switzerland
Beat Waelti beat.waelti@frama.com +41-34-49698-98 Fax: +41-34-49698-00
| PSD-II by FRAMA FRM-II Version 1.2 V2.0.6 (Firmware)
The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines. | - firmware: running on built-in Fujitsu MB91302APM1R micro controller
| 8/16/2013 | - KAS FFC:
- Functions: Full Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #2179, DRBG #393
|
39 | Certicom Corp. 4701 Tahoe Blvd, Building A, 5th Floor Missisauga, ON L4W 0B5 Canada
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Ian Laidlaw ilaidlaw@certicom.com 1-289-261-4277 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.1
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec and SSL modules. | - Intel x86 (Xeon X5650) w/ CentOS Linux 32-bit
- Intel x64 (Xeon X5650) w/ CentOS Linux 64-bit
- Intel x86 (Xeon X5650) w/ Windows XP 32-bit
- Intel x64 (Xeon X5650) w/ Windows XP 64-bit
- ARMv7 w/ QNX Neutrino 8.0
| 7/15/2013 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-256, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-256, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #2164, DSA #784,
RNG #1219, DRBG #388
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
FA: SHA: SHA-256, SHA-512MAC: HMAC
- FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-256, SHA-512MAC: HMAC
- FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-256, SHA-512MAC: HMAC
- FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: - FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: - FB:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- FC:
- SHA: SHA-256, SHA-512
- MAC: HMAC
- Prerequisite: SHS #2164, DSA #784,
RNG #1219, DRBG #388
|
38 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Chris Brych Chris.Brych@safenet-inc.com 613.221.5081 Fax: 613.723.5079
Laurie Smith Laurie.Smith@safenet-inc.com 613.221.5026 Fax: 613.723.5079
| Luna IS Cryptographic Library 6.3.1 (Firmware)
The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 11/21/2012 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1964, ECDSA #369, DRBG #277
|
37 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Chris Brych Chris.Brych@safenet-inc.com 613-221-5081 Fax: 613-723-5079
Laurie Smith Laurie.Smith@safenet-inc.com 613-221-5026 Fax: 613-723-5079
| Luna G5 Cryptographic Library 6.2.3 (Firmware)
The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | | 10/23/2012 | - KAS ECC:
- Functions: Key Pair Generation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1948, ECDSA #365
|
36 | Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 USA
Tim Myers FIPS@microsoft.com 800-Microsoft Fax: (none)
| Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, Windows Phone 8 and Windows Storage Server 2012 Cryptography Next Generation (CNG) Implementations 6.2.9200
The Microsoft Windows Cryptographic Primitives Library is a general purpose, software-based, cryptographic module which can be dynamically linked into applications by developers to permit the use of FIPS 140-2 Level 1 compliant cryptography. | - Qualcomm Snapdragon S4 w/ Windows RT (ARMv7 Thumb-2)
- NVIDIA Tegra 3 Quad-Core w/ Windows RT (ARMv7 Thumb-2)
- Intel Core i7 with AES-NI w/ Windows 8 Enterprise (x64)
- Intel Pentium D w/ Windows 8 Enterprise (x64)
- AMD Athlon 64 X2 Dual Core w/ Windows 8 Enterprise (x86)
- Intel Pentium D w/ Windows Server 2012 (x64)
- Intel Core i7 with AES-NI w/ Windows Server 2012 (x64)
- Qualcomm Snapdragon S4 w/ Windows Phone 8 (ARMv7 Thumb-2)
- Intel x64 Processor with AES-NI w/ Surface Windows 8 Pro (x64)
- Intel Core i7 without AES-NI w/ Windows Storage Server 2012
- Intel Core i7 with AES-NI w/ Windows Storage Server 2012
| 9/26/2012 | - KAS ECC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1903, ECDSA #341, DRBG #258
- KAS FFC:
- Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1903, DSA #687, DRBG #258
|
35 | 3S Group Incorporated 125 Church Street, N.E., Suite 204 Vienna, VA 22180 USA
Satpal S. Sahni ssahni@threesi.com 703-281-5015 Fax: 703-281-7816
| 3SGX 1.0 (Firmware)
3SGX is a high performance PCIe cryptograhic module that provides complete cryptographic support to large numbers of users or applications simultaneously. 3SGX is the core of 3S Group's hardare security appliances, ideal for enterprise key management, virtualization and cloud server solutions that demand high throughput. | | 5/25/2012 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Prerequisite: SHS #1784, ECDSA #297, DRBG #200
- KAS FFC:
- Functions: Full Public Key Validation
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
FA: SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM/HMAC
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- FB:
- SHA: SHA-224, SHA-256, SHA-384
- MAC: HMAC
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
FA: SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- FB:
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- Prerequisite: SHS #1784, DSA #646, DRBG #200
|
34 | Thales e-Security 2200 North Commerce Parkway Suite 200 Weston, FL 33326 USA
Joe Warren Joe.Warren@thalesesec.com 321-264-2928
| Thales Datacryptor 5.0 (Firmware)
The Thales Datacryptor protects the confidentiality and integrity of sensitive data travelling over public networks. | | 4/30/2012 | - KAS ECC:
- Functions: Full Public Key Validation, Key Pair Generation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #1764, ECDSA #289, DRBG #188
|
33 | Pitney Bowes, Inc. 37 Executive Drive Danbury, CT 06810 USA
Dave Riley Dave.Riley@pb.com 203-796-3208
| appKas 02000007 (Firmware)
The Pitney Bowes Cygnus X-3 Hardware Security Module (HSM) employs strong cryptographic and physical security techniques for the protection of funds in Pitney Bowes Postage systems. | | 4/9/2012 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #1733, ECDSA #286, DRBG #181
|
32 | Certicom Corp. 4701 Tahoe Blvd, Building A, 5th Floor Missisauga, ON L4W 0B5 Canada
Certicom Sales sales@certicom.com 905-507-4220 Fax: 905-507-4230
Kris Orr korr@certicom.com 289-261-4104 Fax: 905-507-4230
| Security Builder FIPS Core 6.0.2
Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec SSL and DRM modules. | - 64-bit Intel Core i5-2300 w/ Red Hat Linux 5.6
- 64-bit Intel Core i5-2300 w/ Windows 7
| 3/26/2012 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-256MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-512
- MAC: HMAC
- EE:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Key Confirmation:
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Prerequisite: SHS #1729, DSA #630, DRBG #178
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator
- Parameter Sets:
- Prerequisite: SHS #1729, DSA #630, DRBG #178
|
31 | FRAMA AG Unterdorf Lauperswil, Bern CH-3438 Switzerland
Beat Waelti beat.waelti@frama.com +41-34-49698-98 Fax: +41-34-49698-00
| PSD-II by FRAMA FRM-II Version 1.2 V2.0.4 (Firmware)
The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines. | - firmware: running on built-in Fujitsu MB91302APM1R micro controller
| 2/21/2012 | - KAS FFC:
- Functions: Full Public Key Validation
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1699, DRBG #169
|
30 | Covia Labs 465 Fairchild Dr. Suite 130 Mountain View, CA 94043 USA
Bruce Bernstein bruce.bernstein@covialabs.com@covialabs.com 650-351-6444 Fax: 650-564-9740
| CCCM Library 2.0
The cccmLib is a dynamically linked library whose sole use is to serve as a cryptographic engine to the Covia Labs Connector application. In particular the cccmLib will provide the underlying functionality needed to implement secured communications and an encrypted file system. | - Intel Pentium 4 w/ Ubuntu Linux version 11
- AMD E-350 w/ Red Hat Enterprise Linux version 5.8
| 1/26/2012 | - KAS ECC:
- Functions: Key Pair Generation, Partial Public Key Validation
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Key Confirmation:
- Key Confirmation Roles: Provider, Responder
- Key Confirmation Types: Bilateral
- Parameter Sets:
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1665, ECDSA #265, DRBG #158, HMAC #1136
|
29 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada
Chris Brych chris.brych@safenet-inc.com 613 221 5081 Fax: 613 723 5079
Laurie Smith laurie.smith@safenet-inc.com 613 221 5026 Fax: 613 723 5079
| Luna K5 Cryptographic Library 4.8.7 (Firmware)
The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware and associated co-processor. | | 12/16/2011 | - KAS ECC:
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: K-233
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: B-283
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: K-409
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: K-233
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: B-283
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: K-409
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1671, ECDSA #269,
RNG #998
|
28 | Motorola Solutions Inc 1301 East Algonquin Road Schaumburg, IL 60196 USA
Kirk Mathews kirk.mathews@motorolasolutions.com 847-576-4101
| Motorola Solutions µMace KAS AT58Z04 R00.00.01_KAS (Firmware)
The µMace cryptographic processor is used in security modules embedded in Motorola Solutions security products. | | 11/17/2011 | - KAS ECC:
- Functions: Partial Public Key Validation
- Schemes:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- Prerequisite: ECDSA #263, DRBG #154
|
27 | NEC Corporation 1753 Shimonumabe Nakahara-ku Kawasaki-si, Kanagawa 211-8666 Japan
NEC Corporation pasoinfo_sec@gln.jp.nec.com +81-44-455-8326
| iPASOLINK Diffie-Hellman AES 01.00 (Firmware)
Key generation for iPASOLINK MODEM Card | | 10/13/2011 | - KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1610, DSA #574,
RNG #873
|
26 |
| | | 9/30/2011 | |
25 | Certicom Corp. 4701 Tahoe Blvd, Building A, 5th Floor Missisauga, ON L4W 0B5 Canada
Certicom Sales sales@certicom.com 905-507-4220 Fax: 905.507.4230
Kris Orr korr@certicom.com 289.261.4104 Fax: 905.507.4230
| Security Builder FIPS Core 6.0
Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec SSL and DRM modules. | - 64-bit Intel Core i5-2300 w/ RedHat Linux 5.6
- 32-bit Intel Core i7 w/ RedHat Linux 5.6
- 32-bit Intel Pentium III w/ QNX 6.5
- ARM Cortex A9 MPCore w/ QNX 6.6
- Intel Core 2 Duo w/ Mac OS X 10.5
- 32-bit Intel Core i5-2300 w/ Windows 7
| 9/20/2011 | - KAS ECC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-256MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-256
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1571, ECDSA #242,
RNG #949, DRBG #127
- KAS FFC:
- Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1571, DSA #563,
RNG #949, DRBG #127
|
24 | SafeNet, Inc. 20 Colonnade Road Suite 200 Ottawa, ON K2E 7M6 Canada
Chris Brych Chris.Brych@safenet-inc.com 613-221-5081 Fax: 613-723-5079
Laurie Smith Laurie.Smith@safenet-inc.com 613-221-5026 Fax: 613-723-5079
| Luna G4 4.8.7 (Firmware)
The Luna PCM/PCM KE/CA4 offer dedicated hardware key management to protect sensitive cryptographic keys from attack. Digital sign/verify operations are performed in the HSM to increase performance and maintain security. Cryptographic keys are backed up by a FIPS-approved algorithm and can be stored in software or replicated on one or more tokens. | - StrongARM-11 80200 600 MHz
| 9/6/2011 | - KAS ECC:
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: K-233
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: B-283
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: K-409
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: K-233
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: B-283
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: K-409
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1567, ECDSA #241,
RNG #947
|
23 | SafeNet, Inc. 4690 Millennium Drive Belcamp, MD 21017 USA
Chris Brych Chris.Brych@safenet-inc.com 613.221-5081 Fax: 613.723.5079
Laurie Smith Laurie.Smith@safenet-inc.com 613.221-5026 Fax: 613.723.5079
| Luna K6 Cryptographic Library 6.2.1 (Firmware)
The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor. | | 8/3/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CMAC
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1537, DRBG #114
|
22 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 8800740013F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1483, ECDSA #220, DRBG #104
|
21 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 8800740012F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1482, ECDSA #219, DRBG #103
|
20 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 8800740010F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1481, ECDSA #218, DRBG #102
|
19 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 880074009F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1474, ECDSA #217, DRBG #101
|
18 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 880074007F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1471, ECDSA #216, DRBG #100
|
17 | SPYRUS, Inc. 1860 Hartog Drive San Jose, CA 95131-2203 USA
Jack Young jyoung@spyrus.com 408-392-0319 Fax: 408-392-9131
| SPYRUS FIPS Sector-based Encryption Module 880074006F 03.00.0C (Firmware)
The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files. | | 6/16/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #3, 5.6.3.1 #5
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- KDFs: Concatenation
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1468, ECDSA #215, DRBG #99
|
16 | Francotyp Postalia GmbH Triftweg 21-26 Birkenwerder 16547 Germany
Dirk Rosenau d.rosenau@francotyp.com +49/3303/525/616 Fax: +49/3303/525/07/616
| FP mCryptoLibrary - KAS 1.1 (Firmware)
The firmware implementation of the FPmCryptoLibrary, which runs on an embedded hardware module, with a Maxim IC0400 processor. The cryptographic algortihm implementation is used in context of security critical services. | | 6/16/2011 | - KAS FFC:
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1346, DSA #522, DRBG #61
|
15 |
| | | 6/7/2011 | |
12 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA
Larry Hamid crypto-ims@imation.com 408-737-4308
| Bluefly Processor Firmware 2.4 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 6/7/2011 | - KAS FFC:
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1456, DSA #519,
RNG #884
|
14 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada
Atsushi Yamada ayamada@certicom.com 905-501-3884 Fax: 905-508-4230
Kris Orr korr@certicom.com 605-501-3804 Fax: 908-507-4230
| Security Builder® FIPS Core 5.6
Security Builder® FIPS Core provides application developpers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom's PKI, IPSec SSL and DRM modules. | - ARMv7 w/ QNX Neutrino 6.6
- Intel Celeron N2820 w/ QNX Neutrino 6.6
- Freescale P1010 w/ QNX Neutrino 6.5
| 4/8/2011 | - KAS ECC:
- Functions: Key Pair Generation, Public Key Regeneration
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1, 5.6.3.1 #4, 5.6.3.1 #5, 5.6.3.2 #1, 5.6.3.2 #2
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Prerequisite: SHS #1422, DSA #500, ECDSA #200,
RNG #863, DRBG #82
- KAS FFC:
- Functions: Key Pair Generation, Public Key Regeneration
- Assurances (see SP800-56A): 5.5.2 #1, 5.5.2 #3, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1, 5.6.3.1 #4, 5.6.3.1 #5, 5.6.3.2 #1, 5.6.3.2 #2
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1422, DSA #500,
RNG #863
|
13 | BlackBerry Limited 2200 University Ave. E Waterloo, Ontario N2K 0A7 Canada
Security Certifications Team certifications@blackberry.com 519-888-7465 X72921 Fax: 519-888-9852
| BlackBerry Tablet Cryptographic Library 5.6
The BlackBerry Tablet Cryptographic Library is the software module that provides advanced cryptographic functionality to BlackBerry Tablets. | - ARMv7 w/ BlackBerry Tablet OS
| 4/8/2011 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1, 5.6.3.1 #4, 5.6.3.1 #5, 5.6.3.2 #1, 5.6.3.2 #2
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Ephemeral Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: HMAC
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Prerequisite: SHS #1421, DSA #499,
RNG #862
- KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #1, 5.5.2 #3, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1, 5.6.3.1 #4, 5.6.3.1 #5, 5.6.3.2 #1, 5.6.3.2 #2
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1421, DSA #499,
RNG #862
|
11 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA
Larry Hamid crypto-ims@imation.com 408-737-4308
| Bluefly Processor Firmware 2.3 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 2/24/2011 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1394, DSA #485,
RNG #848
|
10 | General Dynamics C4 Systems 77 A Street Needham, MA 02494 USA
David Aylesworth David.Aylesworth@gdc4s.com 781-400-6527
fortressinfo@gdc4s.com
| Fortress KAS Implementation 1.0 (Firmware)
The Fortress KAS Implementation suite works in unison to provide security to your wireless and wired networks. | - RMI Alchemy MIPS Processon
| 12/6/2010 | - KAS ECC:
- Functions: Full Public Key Validation
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #2
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Initiator
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- ED:
- Curve: P-384
- SHA: SHA-384
- MAC: HMAC
- Prerequisite: SHS #1357, DRBG #66
- KAS FFC:
- Functions: Full Public Key Validation
- Assurances (see SP800-56A): 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1357, DRBG #66
|
9 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA
Larry Hamid crypto-ims@imation.com 408-737-4308
| Bluefly Processor Firmware 2.2 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 8/30/2010 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1315,
RNG #795
|
8 | Certicom Corp. 5520 Explorer Drive., 4th Floor Mississauga, Ontario L4W 5L1 Canada
Rob Williams rwilliams@certicom.com 289-261-4187 Fax: 905-507-4230
Atsushi Yamada ayamada@certicom.com 289-261-4184 Fax: 905-507-4230
| Security Builder GSE-J Crypto Core 2.8
Java cryptographic toolkit. | - Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.5.0
- Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.6.0
- Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.5.0
- Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.6.0
- SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.5.0
- SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.6.0
- SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.5.0
- SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.6.0
- Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.5.0
- Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.6.0
- Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.5.0
- Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.6.0
- Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.5.0
- Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.6.0
| 6/30/2010 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #2, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1
- Schemes:
- Full Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Full MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Ephemeral Unified:
- Key Agreement Roles: Initiator
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass MQV:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- One Pass DH:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-224
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
EA: Curve: P-192SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512MAC: CCM
- EB:
- Curve: P-192
- SHA: SHA-224, SHA-256, SHA-384, SHA-512
- MAC: CCM
- EC:
- Curve: P-256
- SHA: SHA-256, SHA-384, SHA-512
- MAC: CCM
- ED:
- Curve: P-384
- SHA: SHA-384, SHA-512
- MAC: HMAC
- EE:
- Curve: P-521
- SHA: SHA-512
- MAC: HMAC
- Prerequisite: SHS #1281, DSA #455, ECDSA #179,
RNG #773, DRBG #52
- KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #2, 5.6.2.1 #1, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.2.3 #1
- Schemes:
- dhHybrid1:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhEphem:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhHybrid1Flow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhOneFlow:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- dhStatic:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1281, DSA #455,
RNG #773, DRBG #52
|
7 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA
Larry Hamid crypto-ims@imation.com 408-737-4308
| Bluefly Processor Firmware 2.1 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 4/26/2010 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1220,
RNG #735
|
6 | Imation Corp. Discovery Bldg. 1A-041 Oakdale, MN 55128 USA
Larry Hamid crypto-ims@imation.com 408-737-4308
| Bluefly Processor Firmware 2.0 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 3/17/2010 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1186,
RNG #720
|
5 | Cavium Networks 805 E Middlefield Road Mountain View, CA 94109 USA
TA Ramanujam tar@caviumnetworks.com 650-623-7039 Fax: 650-625-9751
| NITROX XL CN16XX-NFBE 1.0 (Firmware)
NITROX XL CN16XX-NFBE HSM (Hardware Security Module) Adapter family. | - Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX Security Processor
| 1/7/2010 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.1 #3, 5.6.2.2 #1, 5.6.3.1 #5
- Schemes:
- Static Unified:
- Key Agreement Roles: Initiator, Responder
- Parameter Sets:
- Prerequisite: SHS #1165, DRBG #32
|
4 | Renesas Technology America, Inc. 450 Holger Way San Jose, CA 95134 USA
Murthy Vedula murthy.vedula@renesas.com 408-382-7615 Fax: 408-382-7700
| Auth_ffc AE57C1, Version 19 BOS_AE57C1_v_2.1_1012 (Firmware)
Renesas BOS software development framework is a mask ROM used for prototyping and mass production of embedded smart chip systems based on AE4XC/AE5XC/N2xx devices. BOS provides authentication and secure program download mechanism. Users can develop embedded applications using the BOS cryptographic, communication, and OS application interfaces. | | 10/9/2009 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.1 #1, 5.6.2.1 #4, 5.6.2.2 #1, 5.6.2.2 #3, 5.6.3.1 #4
- Schemes:
- dhStatic:
- Key Agreement Roles: Responder
- Key Confirmation:
- Key Confirmation Roles: Responder
- Key Confirmation Types: Unilateral
- Parameter Sets:
- Prerequisite: SHS #982,
RNG #585
|
3 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA
Robert Sisson robert.sisson@pb.com 203-924-3061 Fax: 203-924-3518
| appKAS 01.00.0004 (Firmware)
The Pitney Bowes Cygnus X-3 Postal Security Device (PSD) is designed in compliance with FIPS 140-2 and IPMAR standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products. | | 8/17/2009 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #4
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #650, DRBG #20
|
2 | Memory Experts International Inc. 227 Montcalm Suite 101 & 202 Gatineau, Quebec J8Y 3B9 Canada
Larry Hamid lhamid@mxisecurity.com 819-595-3069 Fax: 819-595-3353
| Bluefly Processor Firmware 1.3 (Firmware)
The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals. | | 6/26/2009 | - KAS FFC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #1
- Schemes:
- dhEphem:
- Key Agreement Roles: Responder
- Parameter Sets:
- Prerequisite: SHS #1042,
RNG #622
|
1 | Pitney Bowes, Inc. 35 Waterview Drive Shelton, CT 06484-8000 USA
Robert Sisson Robert.Sisson@pb.com 203-924-3061 Fax: 203-924-3518
| Sigma ASIC - PSDApp 03.00.0049 (Firmware)
The Pitney Bowes Cygnus X-3 Postal Security Device (PSD) is designed in compliance with FIPS 140-2 and IPMAR standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products. | | 5/28/2009 | - KAS ECC:
- Assurances (see SP800-56A): 5.5.2 #3, 5.6.2.3 #4
- Schemes:
- Ephemeral Unified:
- Key Agreement Roles: Responder
- Parameter Sets:
- EC:
- Curve: P-256
- SHA: SHA-256
- MAC: HMAC
- Prerequisite: SHS #650, DRBG #13
|