Last Updated: 6/13/2017
It is important to note that the items on this list are cryptographic modules. A module may either be an embedded component of a product or application, or a complete product in-and-of-itself. If the cryptographic module is a component of a larger product or application, one should contact the product or application vendor in order to determine how the product utilizes the embedded validated cryptographic module. There may be a larger number of security products or applications available which use an embedded validated cryptographic module, than the number of modules which are found in this list. In addition, other vendors, who are not found in this list, may incorporate a validated cryptographic module from this list embedded into their own products.
When selecting a module from a vendor, verify that the module is either the product or application itself (e.g. VPN, SmartCard, USB memory token, etc.) or the module is embedded in a larger product or application (e.g. toolkit, etc.). If the module is embedded in a product or application, ask the product or application vendor to provide a signed letter or statement affirming that the unmodified validated cryptographic module is integrated in the solution; the module provides all the cryptographic services in the solution; and provide reference to the modules validation certificate number from this listing.
NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. The descriptions do not imply endorsement by the U.S. or Canadian Governments or NIST. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. The algorithms, protocols, and cryptographic functions listed as "other algorithms" (e.g. allowed or non-FIPS-Approved algorithms) have not been tested through the CMVP.
NOTE2: The operator of a cryptographic module is responsible for ensuring that the algorithms and key lengths are in compliance with the requirements of NIST SP 800-131A.
NOTE3: All questions regarding the implementation and/or use of any module located on the CMVP module validation lists should first be directed to the appropriate vendor point-of-contact (listed for each entry).
Please contact the CMVP if any errors are discovered or comments with suggestions for improvement of the validation listings.
Cert# | Vendor / CST Lab | Cryptographic Module | Module Type | Validation Date | Sunset Date | Level / Description |
---|---|---|---|---|---|---|
1043 | Entrust, Inc. One Hanover Park 16633 Dallas Parkway Suite 800 Addison, TX 75001 USA Entrust Sales CST Lab: NVLAP 200017-0 | Entrust Entelligenceā¢ Kernel-Mode Cryptomodule (Software Version: 1.1) Validated to FIPS 140-2 Certificate Security Policy Vendor Product Link | Software | 10/15/2008 05/28/2014 | 5/27/2019 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with Microsoft Windows XP Professional SP2 Microsoft Windows Vista Enterprise, 32-bit edition Microsoft Windows Vista Ultimate SP1 64-bit edition (single-user mode) -FIPS Approved algorithms: AES (Cert. #738); Triple-DES (Cert. #655); Triple-DES MAC (Triple-DES Cert. #655, vendor affirmed) -Other algorithms: N/A Multi-chip standalone "The Entrust Entelligence Kernel-Mode Cryptomodule is a software module that implements AES encryption and decryption functions suitable for use in kernel-mode drivers on Windows platforms." |
911 | Harris Corporation 221 Jefferson Ridge Parkway Lynchburg, VA 24501 USA Dennis L. Warheit TEL: 434-455-9205 Shawn Bertrand TEL: 978-905-3064 CST Lab: NVLAP 200427-0 | Harris Corporation Wireless Systems Cryptographic Library (SECLIB) (Software Version: R1A) (When operated in FIPS mode) Validated to FIPS 140-2 Certificate Security Policy | Software | 02/07/2008 07/02/2010 04/10/2015 04/27/2016 | 4/26/2021 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with Windows XP Professional SP2 Windows Server 2003 SP2 Windows 7 Enterprise SP1 running on a Dell Precision Workstation T3500 Windows 8.1 Pro running on a Dell Latitude 430 Android Kit Kat 4.4.2 running on a Samsung Galaxy S5 Active (single-user mode) -FIPS Approved algorithms: AES (Cert. #637); HMAC (Cert. #328); SHS (Cert. #673); Triple-DES (Cert. #591) -Other algorithms: AES MAC (AES Cert. #637; non-compliant); DES; DES MAC; NDRNG; RNG Multi-chip standalone "The Harris Corporation Wireless Systems Cryptographic Library is a software-based cryptographic module that provides encryption, authentication, and other security support services to various M/A-Com product applications. It specifically satisfies FIPS 140-2 Level 1 requirements." |