61 | Totemo AG Freihofstrasse 22 Kuesnacht, Zuerich 8700 Switzerland
Marcel Mock marcel.mock@totemo.com +41 (0) 44 914 9900
| Totemo Cryptographic Module (TCM) 3.0
The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites. | - Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
| 10/19/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
60 | Broadcom Corp. 270 Innovation Drive San Jose, CA 95134 United States
Alfonso Ip Alfonso.ip@broadcom.com 408-922-5624 Fax: 408-922-8050
| SMAU Generic Crypto/Hash BCM5820X
Generic AES operation including CBC, ECB, CRT modes. AES implementation covers 128, 192, 256 bit key lengths. Generates HMAC SHA256 hash when a cryptographic key is passed into the function. Generates SHA256 hash. Generates SHA3 hash. | | 10/19/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
59 | Beijing Sansec Technology Development Co., Ltd 26F No.3 Building, Triumph Center, No.170 Beiyuan Road Chaoyang District Beijing, Beijing 100101 China
Yongxin Xu xuyongxin@sansec.com.cn +86 186 6080 5090
| Sansec HSM - CSM Library 1.0.12 (Firmware)
The CSM library implements cryptographic algorithms for data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), and random number generation. The CMS library is part of the Sansec Hardware Security Module (HSM). | | 9/21/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
58 | Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 USA
Ahmer Sabri ahmer@google.com 201-341-1408
| Offload Engine SHA3 Module 1.0
Hardware implementation of standard SHA3-224 hash algorithm | | 8/27/2018 | |
57 | Gemalto 20 Colonnade Road, Suite 200 Ottawa, ON K2E7M6 Canada
Security and Certification Team SecurityCertfications@gemalto.com
| ProtectServer Internal Express Cryptographic Library 5 (Firmware)
The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions. | - AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
56 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - Intel Core i5 w/ Windows 10 rs3 32 bits
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
55 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - AMD Ryzen5 w/ Windows 2016 64 bits
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
54 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - Intel Core i5 w/ Windows 10 rs3 64 bits
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
53 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - Intel Core i5 w/ Mac OS 10.13
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
52 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - Intel Core i5 w/ CentOS 7.4 64 bits
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
51 | Trend Micro Inc. 8F, No. 198, Tun Hua S. Rd., Sec. 2 Taipei, na 106 Taiwan
Phoenix Liau Phoenix_Liau@trend.com.tw +886-2-23789666
Harvey Lee Harvey_Lee@trend.com.tw
| Trend Micro Cryptographic Module Core Library 1.0
Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption. | - AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
| 7/20/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
50 | Infosec Global Inc. 2225 Sheppard Avenue East Suite 1402 Toronto, Ontario M2J 5C2 Canada
Brian Neill brian.neill@infosecglobal.com 416-492-3333 Fax: 647-343-6933
Ian Laidlaw ian.laidlaw@infosecglobal.com 416-492-3333 Fax: 647-343-6933
| AgileSec FIPS Provider 1.0 1.0
AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards. | - Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
- Intel Core i5 CPU with AES-NI w/ OSX 10.12
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
- Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
- Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
- Intel Core i5 CPU without AES-NI w/ OSX 10.12
- Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
- Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
- Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
- Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
| 7/13/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
49 | SafeLogic, Inc. 530 Lytton Ave Suite 200 Palo Alto, CA 94301 USA
SafeLogic Inside Sales sales@safelogic.com 844-436-2797
| CryptoComply for Java 3.0.1
SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing. | - Intel i7 w/ Java SE 8 on Windows Server 2012 R2
- Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
| 7/6/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
48 | Securosys SA Forrlibuckstrasse 70 Zurich, Zurich 8005 Switzerland
Marcel Dasen dasen@securosys.ch +41 44 552 31 33
Robert Rogenmoser roro@securosys.ch +41 44 552 31 11
| Primus HSM Cryptographic Library XC7K160T 2.5.3 (Firmware)
Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG. | | 6/15/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
47 | REDCOM Laboratories, Inc One REDCOM Center Victor, NY 14564-0995 United States
Sal Ceravolo Sal.ceravolo@redcom.com 585-905-0451
Chris Hasenauer Chris.hasenauer@redcom.com 585-905-0451
| REDCOM Encryption 140-2 3.0.1
REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. | - Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
- Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
| 6/1/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
46 | KeyNexus, Inc. 205-2657 Wilfert Road Victoria, BC V9B6A7 Canada
Jason Novecosky jason@keynexus.net
| KeyNexus Cryptographic Library 1.0
The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products. | - Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
| 5/25/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
45 | wolfSSL Inc. 10016 Edmonds Way Suite C-300 Edmonds, WA 98020 USA
Todd Ouska todd@wolfssl.com 503-679-1859
Larry Stefonic larry@wolfssl.com 206-369-4800
| wolfCrypt 4.0
wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency. | - Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
- Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
- Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
- Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
| 5/18/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
44 | D'Crypt Pte Ltd 28 Sin Ming Lane #06-133 Midview City Singapore, Singapore 573953 Singapore
Sales & Marketing marketing@d-crypt.com (65) 6933-1800 Fax: (65) 6684-5142
Quek Gim Chye fips@d-crypt.com (65) 6933-1823 Fax: (65) 6684-5142
| D'Crypt Cryptographic Library 3.8 (Firmware)
The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications. | | 5/3/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
43 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.3.0
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security. | - Intel Atom C3558 without AES-NI w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
- Intel Atom C3558 with AES-NI w/ QNX SDP 7
- Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
- Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
- TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
- TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
| 4/27/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
|
42 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Manoj Maskara mmaskara@vmware.com 650-427-1000 Fax: 650-475-5001
| VMware BC-FJA (Bouncy Castle FIPS Java API) 1.0.0
The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API). | - Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
- Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
- Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
| 4/9/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
41 | Certicom Corp. 4701 Tahoe Blvd, Building A 5th Floor Mississauga, Ontario L4W 0B5 Canada
Certicom Support support@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
Certicom Sales sales@certicom.com 1-905-507-4220 Fax: 1-905-507-4230
| Security Builder® FIPS Core 6.3.0
Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security. | - Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
- Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
- Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
- TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
- TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
- Intel Atom C3558 without AES-NI w/ QNX SDP 7
- Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
- Intel Atom C3558 with AES-NI w/ QNX SDP 7
| 2/9/2018 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
40 | Synopsys, Inc. 690 East Middlefield Road Mountain View, CA 94043 USA
Dana Neustadter danan@synopsys.com +1(613)595-9836
| DWC Cryptography Software Library 4.2.0
The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows). | - ARC® EM7D Processor with CryptoPack w/ n/a
| 10/27/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
39 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Manoj Maskara mmaskara@vmware.com 650-427-1000 Fax: 650-475-5001
Michael McKay mmckay@vmware.com 650-427-3615 Fax: 650-475-5001
| VMware BC-FJA (Bouncy Castle FIPS Java API) 1.0.0
The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API). | - Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
| 9/1/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
|
38 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS Java API 1.0.1
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. | - Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
- Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
| 9/1/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 0 bits
- Output Length Max: 65536 bits
|
37 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core without PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - SPARC T4 w/ Solaris(R) 11 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
36 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - SPARC T4 w/ Solaris(R) 11 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
35 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core without PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
34 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
33 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core without PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
32 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
31 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core without PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
30 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
| 8/25/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
29 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
| 8/18/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
28 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
| 8/18/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
27 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
| 8/18/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
26 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
| 8/18/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
25 | IBM(R) Corporation Seabank Centre 12 - 14 Marine Parade Southport, QLD 4215 Australia
Peter Waltenberg pwalten@au1.ibm.com +61 7 5552 4016 Fax: +61 7 5571 0420
| ICC Algorithmic Core with PAAs 8.6.0.0
ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider. | - Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
| 8/18/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
24 | SafeLogic, Inc. 530 Lytton Ave Suite 200 Palo Alto, CA 94301 USA
SafeLogic Inside Sales sales@safelogic.com (844) 436-2797
| CryptoComply Java Engine 3.0.1
CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. | - Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
| 8/11/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
23 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA
Costin Alex. Pavel costin.pavel@intel.com +353 61 777 683
Alan Carew alan.carew@intel.com +353 61 477 487
| Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D15XX Series 1.0.0 1.0.0
The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms. | - Intel® Xeon® Processor D w/ Red Hat 7.1
| 8/4/2017 | |
22 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA
Costin Alex. Pavel costin.pavel@intel.com +353 61 777 683
Alan Carew alan.carew@intel.com +353 61 477 487
| Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Xeon® Processor D21XX Series 1.0.0 1.0.0
The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms. | - Intel® Xeon® Processor D w/ Red Hat 7.1
| 8/4/2017 | |
21 | Amazon Web Services, Inc. 410 Terry Ave N Ste 1200 Seattle, WA 98109-5210 USA
Kelvin Yiu kelvinyi@amazon.com
Ken Beer nbeer@amazon.com
| AWS Key Management Service Cryptographic Algorithm Library 1.0.0 (Firmware)
The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module. | | 6/9/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
20 | Xilinx, Inc. 2100 Logic Drive San Jose, CA 95124 USA
James Wesselkamper jimwe@xilinx.com 505-798-6863
| SHA3/384 Zynq Ultrascale+ MPSoC
SHA3/384 Hard Core | | 3/31/2017 | |
19 | Xilinx, Inc. 2100 Logic Drive San Jose, CA 95124 USA
James Wesselkamper jimwe@xilinx.com 505-798-6863
| SHA3/384 Ultrascale, Ultrascale+
SHA3/384 Hard Core | | 3/31/2017 | |
18 | Attivo Networks, Inc. 47697 Westinghouse Drive, Suite 201 Fremont, CA 94539 USA
Satya Das 510 623-1000
| Attivo Cryptographic Provider 1.0 (Firmware)
Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics. | - Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
- Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
| 3/6/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
17 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA
Costin Alex. Pavel costin.pavel@intel.com +353 61 777 683
Alan Carew alan.carew@intel.com +353 61 477 487
| Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Chipset C62X Series 1.0.0
The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms. | - Intel® Xeon® Processor w/ Red Hat 7.1
| 2/28/2017 | |
16 | Intel Corporation 2200 Mission College Blvd. Santa Clara, California 95054 USA
Costin Alex. Pavel costin.pavel@intel.com +353 61 777 683
Alan Carew alan.carew@intel.com +353 61 477 487
| Intel® QuickAssist Technology (Intel® QAT) Software Library for Cryptography on the Intel® Atom™ Processor C3XXX Series 1.0.0
The accelerator features are invoked using the Intel® QuickAssist Technology Cryptographic API which provides application scalability and portability across platforms. | - Intel® Atom™ Processor w/ Fedora 22 (kernel 4.0.4-301)
| 2/28/2017 | |
15 | Information Security Corporation 1011 Lake St. Suite 425 Oak Park, IL 60118 USA
Jonathan Schulze-Hewett schulze-hewett@infoseccorp.com 708-445-1704 Fax: 708-445-9705
Michael Markowitz markowitz@infoseccorp.com 708-445-1704 Fax: 708-445-9705
| ISC Cryptographic Development Kit (CDK) 8.0
The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions. | - Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
| 2/10/2017 | - SHA3-256:
- SHA3-384:
- SHA3-512:
|
14 | NXP Semiconductors Stresemannallee 101 Hamburg, Hamburg 22529 Germany
Dr. Almar Kaid almar.kaid@nxp.com + 49 (40) 5613 5123 Fax: + 49 (40) 5613 62773
| P73N2M0 Crypto Library p73n2m0b0.200 1.0.8
The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+. | | 2/10/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
13 | NXP Semiconductors Stresemannallee 101 Hamburg, Hamburg 22529 Germany
Dr. Almar Kaid almar.kaid@nxp.com + 49 (40) 5613 5123 Fax: + 49 (40) 5613 62773
| P73N2M0 Crypto Library 1.0.8
The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+. | | 2/10/2017 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
12 | Distech Controls, Inc. 4205 Place de Java Brossard, QC J4Y 0C4 Canada
Dominic Gagnon dgagnon@distech-controls.com 450-444-9898 Ext.231 Fax: 450-444-0770
François Gervais fgervais@distech-controls.com 450-444-9898 Ext.263 Fax: 450-444-0770
| Distech Java Cryptographic Library 1.0 (Firmware)
The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers. | - AM335x Cortex-A8 (ARMv7) /w NEON
| 12/23/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
11 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Eric Betts betts@vmware.com 408-891-0590
Michael McKay mmckay@vmware.com 408-891-0590
| VMware Java JCE (Java Cryptographic Extension) Module BC FIPS 1.0.0
The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions. | - Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
| 12/16/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
10 | VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94303 USA
Eric Betts betts@vmware.com 408-891-0590
Michael McKay mmckay@vmware.com 408-891-0590
| VMware Java JCE (Java Cryptographic Extension) Module BC FIPS 1.0.0
The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions. | - Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
- Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
| 12/2/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
9 | Attivo Networks, Inc. 47697 Westinghouse Drive, Suite 201 Fremont, CA 94539 USA
Satya Das 510 623-1000
| Attivo Cryptographic Provider 1.0
Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics. | - Intel(R) Xeon(R) CPU ES-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
| 10/28/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
8 | Allegro Software Development Corporation 1740 Massachusetts Avenue Boxborough, MA 01719 USA
Alan Presser apresser@allegrosoft.com (978) 264-6600
| Allegro Cryptographic Engine 6.2
The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange. | - Intel Core i7 without AES-NI w/ Windows 10 Professional
- Intel Core i7 with AES-NI w/ Windows 10 Professional
- Intel Core i7 without AES-NI w/ Linux Mint 18
- Intel Core i7 with AES-NI w/ Linux Mint 18
| 10/14/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
7 | Check Point Software Technologies, Ltd. 9900 Belward Campus Drive Suite 250 Rockville, MD 20850 USA
Malcom Levy product_certifications@checkpoint.com +97237534561
| Check Point Crypto Core 4.0
Check Point Crypto Core 4.X is a 140-2 Level 1 cryptographic module for Windows and Mac platforms. The module provides cryptographic services accessible in kernel mode and user mode on the respective platforms through implementation of platform-specific binaries. | - Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
- Intel Core i5 with AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
- Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (User Mode, x64)
- Intel Core i5 without AES-NI w/ Windows 10 Anniversary Update (Kernel Mode, x64)
- Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
- Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (User Mode, x64)
- Intel Core i7 with AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
- Intel Core i7 without AES-NI w/ macOS Sierra 10.12 (Kernel Mode, x64)
| 10/6/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
6 | Oberthur Technologies 402 rue d'Estienne d'Orves Colombes 92700 France
GOYET Christophe c.goyet@oberthur.com +1 703 322 8951
BOUKYOUD Saïd s.boukyoud@oberthur.com +33 1 78 14 72 58 Fax: +33 1 78 14 70 20
| SHA on Cosmo V8.1 HW = ‘30’ with FW = ‘5F01’ and HW = ‘40’ with FW = ‘6001’ 06939.18 with 08001.3 (Firmware)
ID-One Cosmo V8.1 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.4 and Global Platform 2.2.1 which supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, as well as SHA-3. | | 10/6/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|
5 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS .NET API 1.0.1
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. | - Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
- Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
- Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
- Intel Atom w/ Windows 10 Professional 64 bit
| 8/4/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
4 | Information Security Corporation 1011 Lake St. Suite 425 Oak Park, IL 60118 USA
Jonathan Schulze-Hewett schulze-hewett@infoseccorp.com 708-445-1704 Fax: 708-445-9705
Michael Markowitz markowitz@infoseccorp.com 708-445-1704 Fax: 708-445-9705
| ISC Cryptographic Development Kit (CDK) 8.0
The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions. | - Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
- Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
- AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
| 6/21/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
3 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS Java API 1.0.0
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. | - Intel Xeon E5 v3 w/ Java SE Runtime Env 7 on Solaris 11 on vSphere 6
- Intel Xeon E5 v3 w/ Java SE Runtime Env 8 on Centos 6.4 on vSphere 6
- Intel Xeon E5-2697 V3 w/ Ubuntu 14.04 LTS on VMWare ESXi 6.0
| 4/1/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
2 | Legion of the Bouncy Castle Inc. 85 The Crescent Ascot Vale, Victoria 3032 Australia
David Hook dgh@bouncycastle.org +61438170390
Jon Eaves jon@bouncycastle.org +61417502969
| Bouncy Castle FIPS .NET API 1.0.0
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. | - Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
- Intel Atom w/ Windows 10 Professional 64 bit
- Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
- Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
| 3/25/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
- SHAKE-128:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
- SHAKE-256:
- Supports Empty Message
- Output Length Min: 16 bits
- Output Length Max: 65536 bits
|
1 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA
Global Certification Team certteam@cisco.com
| CRYPEN IPsec 1.0 (Firmware)
CRYPEN IPsec is embedded within proprietary ASICs that are utilized within Cisco hardware platforms. | - Synopsys VCS v2014.12mx-SP3-2
| 3/25/2016 | - SHA3-224:
- SHA3-256:
- SHA3-384:
- SHA3-512:
|