Last Updated: 8/23/2017
It is important to note that the items on this list are cryptographic modules. A module may either be an embedded component of a product or application, or a complete product in-and-of-itself. If the cryptographic module is a component of a larger product or application, one should contact the product or application vendor in order to determine how the product utilizes the embedded validated cryptographic module. There may be a larger number of security products or applications available which use an embedded validated cryptographic module, than the number of modules which are found in this list. In addition, other vendors, who are not found in this list, may incorporate a validated cryptographic module from this list embedded into their own products.
When selecting a module from a vendor, verify that the module is either the product or application itself (e.g. VPN, SmartCard, USB memory token, etc.) or the module is embedded in a larger product or application (e.g. toolkit, etc.). If the module is embedded in a product or application, ask the product or application vendor to provide a signed letter or statement affirming that the unmodified validated cryptographic module is integrated in the solution; the module provides all the cryptographic services in the solution; and provide reference to the modules validation certificate number from this listing.
NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. The descriptions do not imply endorsement by the U.S. or Canadian Governments or NIST. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. The algorithms, protocols, and cryptographic functions listed as "Other" or "Allowed" have not been tested through the CMVP and are not FIPS-Approved.
NOTE2: The operator of a cryptographic module is responsible for ensuring that the algorithms and key lengths are in compliance with the requirements of NIST SP 800-131A.
NOTE3: All questions regarding the implementation and/or use of any module located on the CMVP module validation lists should first be directed to the appropriate vendor point-of-contact (listed for each entry).
Please contact the CMVP if any errors are discovered or comments with suggestions for improvement of the validation listings.
Cert# | Vendor / CST Lab | Cryptographic Module | Module Type | Validation Date | Sunset Date | Level / Description |
---|---|---|---|---|---|---|
1639 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA Global Certification Team CST Lab: NVLAP 200427-0 | Cisco 5940 Embedded Services Routers (Hardware Versions: Cisco 5940 ESR air-cooled card and Cisco 5940 ESR conduction-cooled card; Firmware Version: 15.2(3)GC) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 11/16/2011 02/23/2012 07/18/2012 02/08/2013 | 2/7/2018 | Overall Level: 1 -Design Assurance: Level 2 -FIPS Approved algorithms: AES (Certs. #962, #1535 and #1643); DRBG (Cert. #89); HMAC (Certs. #537 and #965); RSA (Cert. #811); SHS (Certs. #933 and #1444); Triple-DES (Certs. #757 and #1073) -Other algorithms: DES; DES MAC; HMAC-MD5; MD4; MD5; RC4; Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); GDOI (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength) Multi-chip embedded "The Cisco 5940 is a high-performance, ruggedized router. With onboard hardware encryption, the Cisco 5940 offloads encryption processing from the router to provide highly secure yet scalable video, voice, and data services for mobile and embedded outdoor networks. The Cisco 5940 Embedded Services Routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 1 requirements. The Cisco 5940 Router Card uses industrial-grade components and is optimized for harsh environments that require Cisco IOS Software routing technology." |
1636 | Seagate Technology LLC 1280 Disc Drive Shakopee, MN 55379 USA David R Kaiser, PMP TEL: 952-402-2356 FAX: 952-402-1273 CST Lab: NVLAP 200427-0 | Seagate Secure Constellation® ES [24-36] and Constellation®.2 [1-23] Self-Encrypting Drives FIPS 140 Module (Hardware Versions: 9XU268 [1, 6, 18, 19], 9XU268-251 [2, 7, 9, 11, 14, 16, 20], 9XU268-257 [3, 8, 10, 12, 13, 15, 17, 21], 9XU268-047 [4], 9XU268-090 [5], 9XU264 [1, 6, 18, 19], 9XU264-251 [2, 7, 9, 11, 14, 16, 20], 9XU264-257 [3, 8, 10, 12, 13, 15, 17, 21], 9XU264-047 [4], 9XU264-090 [5], 9XU168 [22, 23], 9XU164 [22, 23], 9XU162 [22, 23], 1AV268 [24, 26, 32], 1AV264 [24, 26, 32], 1AV264-257 [25, 28, 30, 33], 1AV264-251 [27, 29, 31, 34], 1AV262 [24, 26, 32], 1AV168 [35, 36], 1AV164 [35, 36] and 1AV162 [35, 36]; Firmware Versions: A002 [1], ASF2 [2], ANF1 [3], NS01 [4], QF70 [5], 0003 [6, 23, 32], ASF5 [7], AEF3 [8], ASF8 [9], AEF5 [10], ASF9 [11], AEF6 [12], AEF7 [13], ASFC [14], AEFB [15], ASFD [16], AEFC [17], 0004 [18], 0005 [19], ASFE [20], AEFD [21], 0002 [22, 26, 36], A001 [24, 35], PNF0 [25], PSF1 [27], PEF3 [28], PSF4 [29], PEF4 [30], PSF5 [31], PEF5 [33] and PSF9 [34]) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 11/10/2011 03/14/2012 06/21/2012 10/17/2012 12/12/2012 01/25/2013 02/20/2014 09/26/2014 10/23/2014 11/14/2016 05/09/2017 | 11/13/2021 | Overall Level: 2 -EMI/EMC: Level 3 -FIPS Approved algorithms: AES (Certs. #1416, #1417 and #1343); DRBG (Cert. #62); RSA (Cert. #650); SHS (Cert. #1225) -Other algorithms: N/A Multi-chip embedded "The Seagate Secure Enterprise Self-Encrypting Drives FIPS 140 Module is embodied in Seagate Constellation®.2 and Constellation® ES SED model disk drives. These products meet the performance requirements of the most demanding Enterprise applications. The cryptographic module (CM) provides a wide range of cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, instantaneous user data disposal with cryptographic erase, independently controlled and protected user data LBA bands and authenticated FW download." |
1635 | Seagate Technology LLC 1280 Disc Drive Shakopee, MN 55379 USA David R Kaiser, PMP TEL: 952-402-2356 FAX: 952-402-1273 CST Lab: NVLAP 200427-0 | Seagate Secure Constellation® ES.2 [45-74], Savvio® 10K.5 [1-28] and Savvio® 15K.3 [29-44] Self-Encrypting Drives FIPS 140 Module (Hardware Versions: 9XS066 [1, 7, 21], 9XS066-251 [2, 8, 13, 16, 20, 28], 9XS066-257 [3, 9, 14, 17, 18, 27], 9XS066-047 [4], 9XS066-090 [5, 11, 22, 23], 9XS066-031 [10, 19], 9XS066-037 [10,19], 9XS066-046 [12], 9XR066 [1, 7, 21], 9XR066-251 [2, 8, 13, 16, 20, 28], 9XR066-257 [3, 9, 14, 17, 18, 27], 9XR066-047 [4], 9XR066-090 [5, 11, 22, 23], 9XR066-038 [6, 15, 24, 25, 26], 9XR066-046 [12], 9XP066 [1, 7, 21], 9XP066-047 [4], 9XP066-090 [5, 11, 22, 23], 9XP066-046 [12], 9XN066 [1, 7, 21], 9XN066-251 [2, 8, 13, 16, 20, 28], 9XN066-257 [3, 9, 14, 17, 18, 27], 9XN066-047 [4], 9XN066-090 [5, 11, 22, 23], 9XN066-046 [12], 9XM066 [29, 32, 42], 9XM066-251 [30, 33, 35, 37, 39, 41, 44], 9XM066-257 [31, 34, 36, 39, 40, 43], 9XL066 [29, 32, 42], 9XL066-251 [30, 33, 35, 37, 39, 41, 44], 9XL066-257 [31, 34, 36, 39, 40, 43], 9XT260 [45, 51, 63, 68, 69, 70], 9XT260-251 [46, 52, 56, 59, 64, 65, 66, 71], 9XT260-257 [47, 53, 57, 59, 61, 67, 72], 9XT260-038 [48, 58], 9XT260-047 [49], 9XT260-090 [50], 9XT260-031 [54, 62], 9XT260-037 [54, 62], 9XT260-046 [55], 9XT267 [51, 63, 68, 69] and 9XT160 [73, 74]; Firmware Versions: A002 [1, 29], CSF2 [2], CNF1 [3], NS03 [4], HF72 [5], NA00 [6, 58], 0003 [7, 32, 68], CSF4 [8], CEF3 [9], CE01 [10], HF75 [11], 6E01 [12], CSF7 [13], CEF4 [14], F740 [15], CSF8 [16], CEF5 [17], CEF6 [18], CE06 [19], CSFA [20], 0004 [21, 42, 69], HF7C [22], HF7D [23], NA01 [24], NA04 [25], F744 [26], CEF9 [27], CSFB [28], YSF3 [30], YNF2 [31], YSF5 [33], YEF4 [34], YSF8 [35], YEF5 [36], YSF9 [37], YEF6 [38], YSFB [39], YEF9 [40], YSFC [41], YEFA [43], YSFD [44], 0002 [45], RSF3 [46], RNF3 [47], NQE1 [48], NS01 [49], NF72 [50], 0005 [51], RSF5 [52], REF5 [53], YE01 [54], 6EA1 [55], RSF8 [56], REF6 [57], RSFA [59], REF7 [60], REF8 [61], YE04 [62], 0006 [63], RSFC [64], RSFD [65], RSFE [66], REFB [67], A006 [70], RSFF [71], REFC [72], F000 [73] and F003 [74]) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 11/10/2011 11/17/2011 03/14/2012 06/21/2012 10/17/2012 12/12/2012 01/25/2013 10/18/2013 02/20/2014 06/05/2014 09/26/2014 10/23/2014 12/10/2015 04/04/2016 05/09/2017 | 4/3/2021 | Overall Level: 2 -EMI/EMC: Level 3 -FIPS Approved algorithms: AES (Certs. #1416, #1417 and #1343); DRBG (Cert. #62); SHS (Cert. #1225); RSA (Cert. #650) -Other algorithms: N/A Multi-chip embedded "The Seagate Secure Enterprise Self-Encrypting Drives FIPS 140 Module 2 is embodied in Seagate Constellation® ES.2, Savvio® 15K.3, and Savvio® 10K.5 SED model disk drives. These products meet the performance requirements of the most demanding Enterprise applications. The cryptographic module (CM) provides a wide range of cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, instantaneous user data disposal with cryptographic erase, independently controlled and protected user data LBA bands and authenticated FW download." |
1627 | Communication Devices, Inc. #1 Forstmann Court Clifton, NJ 07011 USA Donald Snook TEL: 973-334-1980 CST Lab: NVLAP 200002-0 | Port Authority Series (Hardware Versions: PA111-SA CDI 01-03-0912I, PA111-RM CDI 01-03-0912I, PA155-RM CDI 01-03-0912I and PA199-RM CDI 01-03-0912I; Firmware Version: 10.05.10) (When operated in FIPS mode. The protocols SSH and SNMP shall not be used when operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 11/01/2011 08/24/2016 | 8/23/2021 | Overall Level: 2 -Roles, Services, and Authentication: Level 3 -FIPS Approved algorithms: AES (Cert. #3846); SHS (Cert. #3169); HMAC (Cert. #2495); DRBG (Cert. #1090); KTS (AES Cert. #3846 and HMAC Cert. #2495) -Other algorithms: NDRNG; SNMP KDF (non-compliant); SSH KDF (non-compliant); Triple-DES (non-compliant); Multi-chip standalone "Secure Out of Band Management appliance with network port, internal modem, and up to 9 serial ports. Allows Secure Out of Band Access to Firewalls, Routers, Network appliances etc.. Supports up to 256 bit AES CFB encryption." |
1621 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA Global Certification Team CST Lab: NVLAP 200427-0 | Cisco 7606-S and 7609-S Routers with Supervisor SUP720-3B (Hardware Versions: 7606-S and 7609-S with SUP720-3B; Firmware Version: 15.1(3)S5) (When operated in FIPS mode with the tamper evident labels and opacity shields installed as indicated in the Security Policy) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 10/28/2011 02/09/2012 02/23/2012 07/09/2012 08/16/2013 | 8/15/2018 | Overall Level: 2 -Roles, Services, and Authentication: Level 3 -FIPS Approved algorithms: AES (Cert. #1634); DRBG (Cert. #88); HMAC (Cert. #961); RSA (Cert. #808); SHS (Cert. #1439); Triple-DES (Cert. #1070) -Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 156 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; DES MAC; HMAC MD5; MD4; MD5; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) Multi-chip standalone "The Cisco 7606-S and 7609-S routers are designed for deployment at the network edge, where robust performance and IP/Multiprotocol Label Switching services are necessary to meet the requirements of both enterprises and service providers. It enables Carrier Ethernet service providers to deploy an advanced network infrastructure that supports a range of IP video and triple-play (voice, video, and data) system applications in both the residential and business services markets. They also deliver WAN and metropolitan-area network networking solutions at the enterprise edge." |
1614 | Mocana Corporation 350 Sansome Street Suite 1010 San Francisco, CA 94104 USA James Blaisdell TEL: 415-617-0055 FAX: 415-617-0056 CST Lab: NVLAP 100432-0 | Mocana Cryptographic Suite B Module (Software Version: 5.4f) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Software | 09/30/2011 10/26/2011 11/08/2011 04/12/2016 | 4/11/2021 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with Vx Works 6.7 Android 2.2 VxWorks 5.5 VxWorks 6.2 VxWorks 6.4 WindRiver 4.0 using Linux 2.6.34 (single-user mode) -FIPS Approved algorithms: AES (Certs. #1505, #1506, #1507, #1509 and #1510); Triple-DES (Cert. #1006); SHS (Cert. #1353); HMAC (Cert. #885); RSA (Cert. #738); DSA (Cert. #472); ECDSA (Cert. #187); DRBG (Cert. #64) -Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; Blowfish; ARC2; ARC4; MD2; MD4; MD5; HMAC-MD5; AES EAX (non-compliant); AES XCBC (non-compliant); RSA (encrypt/decrypt); RNG; Dual EC DRBG Multi-chip standalone "The Mocana Cryptographic Suite B Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com." |
1592 | Harris Corporation 221 Jefferson Ridge Parkway Lynchburg, VA 24501 USA Brian Justice TEL: 434-455-9586 Joyce O'Quinn TEL: 434-455-6458 CST Lab: NVLAP 200427-0 | Harris Unified Audio Card (Hardware Version: EA-103168-002; Firmware Versions: MPC 860: SK-007765-007 v R03A08, DSP: SK-007765-013 v R03A05, Boot Loader / Factory Test: R03A02, Low Level Boot: R01D01 and DSP Factory Test: R01D02) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 08/22/2011 04/13/2016 | 4/12/2021 | Overall Level: 1 -FIPS Approved algorithms: AES (Certs. #1652 and #1653); HMAC (Cert. #970); SHS (Cert. #1450) -Other algorithms: AES MAC (AES Cert. #1653, vendor affirmed; P25 AES OTAR); RNG Multi-chip embedded "The Harris UAC is a multi-channel analog audio gateway used to interface analog radio communication equipment such as conventional base stations to radio systems and other devices on a Voice Interoperability Data Access (VIDA) network." |
1579 | Certicom Corp. 4701 Tahoe Blvd., Building A Mississauga, Ontario L4W 0B5 Canada Certicom Support TEL: 905-507-4220 Certicom Sales TEL: 905-507-4220 CST Lab: NVLAP 200426-0 | Security Builder FIPS Module (Software Versions: 5.6, 5.6.1 or 5.6.2) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Software | 07/21/2011 06/05/2012 08/16/2012 03/13/2015 01/26/2016 07/05/2016 | 7/4/2021 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with QNX Neutrino Version 6.6 QNX Neutrino Version 6.5 (single-user mode) -FIPS Approved algorithms: Triple-DES (Cert. #1054); AES (Cert. #1609); SHS (Cert. #1422); HMAC (Cert. #945); DRBG (Cert. #82); DSA (Cert. #500); ECDSA (Cert. #200); RSA (Cert. #791); KAS (Cert. #14; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112-bits of encryption strength); KTS (AES Cert. #1609; key establishment methodology provides between 128 and 256 bits of encryption strength) -Other algorithms: DES; DESX; AES CCM* (non-compliant); ARC2; ARC4; MD2; MD4; MD5; HMAC-MD5; ECNR; ECQV; ECIES; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG; DRBG (non-compliant) Multi-chip standalone "The Security Builder FIPS Module is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications. The Security Builder FIPS Module is part of the Certicom Security Architecture, a comprehensive cross-platform security solution which supports multiple cryptographic software and hardware providers with a single common API." |
1578 | BlackBerry 295 Phillip Street Waterloo, Ontario N2L 3W8 Canada Security Certifications Team TEL: 519-888-7465 x 72921 FAX: (519) 888-9852 CST Lab: NVLAP 200426-0 | BlackBerry OS Cryptographic Library (Software Versions: 5.6, 5.6.1 or 5.6.2) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy Vendor Product Link | Software | 07/21/2011 06/05/2012 08/16/2012 01/24/2013 02/22/2013 04/11/2014 01/24/2016 06/21/2016 | 6/20/2021 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with BlackBerry® Tablet OS Version 2.0 (Binary compatible to BlackBerry® Tablet OS Version 1.0) (single-user mode) -FIPS Approved algorithms: Triple-DES (Cert. #1053); AES (Cert. #1608); SHS (Cert. #1421); HMAC (Cert. #944); DRBG (Cert. #81); DSA (Cert. #499); ECDSA (Cert. #199); RSA (Cert. #790); KAS (Cert. #13; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112-bits of encryption strength); KTS (AES Cert. #1608; key establishment methodology provides between 128 and 256 bits of encryption strength) -Other algorithms: DES; DESX; AES CCM* (non-compliant); ARC2; ARC4; MD2; MD4; MD5; HMAC-MD5; ECNR; ECQV; ECIES; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG; DRBG (non-compliant) Multi-chip standalone "The BlackBerry OS Cryptographic Library is a software module that provides the cryptographic functionality required for secure operation of the BlackBerry® PlayBook™ and devices running the BlackBerry® 10 OS ." |
1577 | Futurex 864 Old Boerne Rd. Bulverde, TX 78163 USA Paul Enman TEL: 830-980-9782 FAX: 830-438-8782 CST Lab: NVLAP 100432-0 | EXP9000 Hardware Security Module (Hardware Versions: P/N 9750-2075, Revision B; Firmware Version: 4.2.0) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 08/05/2011 02/01/2017 | 1/31/2022 | Overall Level: 3 -FIPS Approved algorithms: AES (Cert. #1636); DRBG (Cert. #1243); HMAC (Cert. #962); RSA (Certs. #810 and #2331); SHS (Cert. #1441); Triple-DES (Cert. #1072) -Other algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); DES; TR-31 Multi-chip embedded "The EXP9000 cryptographic module provides secure encryption, storage, and transmission of sensitive data used in a wide variety of applications including Futurex Hardware Security Modules (HSM) and Key Management Servers (KMS)." |
1543 | CareFusion 10020 Pacific Mesa Blvd. San Diego, CA 92121 USA Tom Miller TEL: 858-617-2000 CST Lab: NVLAP 100432-0 | Alaris™ PC Unit Model 8015 (Hardware Version: Model 8015 a/b/g or Model 8015 a/b/g/n with FIPS Kit 11935165; Firmware Versions: 9.7.40, 9.12.40, 9.17.1, 9.19, 9.19.1 or 9.33) (When operated in FIPS mode with tamper evident seals installed as indicated in the Security Policy) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 05/27/2011 01/11/2012 09/27/2012 06/05/2014 02/13/2015 07/23/2015 08/07/2015 06/07/2016 07/10/2017 | 6/6/2021 | Overall Level: 2 -Cryptographic Module Specification: Level 3 -Design Assurance: Level 3 -FIPS Approved algorithms: AES (1) (Cert. #1436); SHS (Cert. #1301) -Other algorithms: AES (2) (non-compliant); RC4; MD5; SHS (non-compliant); RIPEMD; DES; Triple-DES (non-compliant); RC2-CBC, RC2-ECB, RC2-CFB64, RC2-OFB64; Blowfish; CAST; RSA (non-compliant); DSA (non-compliant); Diffie-Hellman; RNG (non-compliant) Multi-chip standalone "The CareFusion Alaris™ PC Unit Model 8015 is a point-of-care unit, which is the main component of the Alaris System. The Alaris System is a modular system intended for adult, pediatric, and neonatal care in a professional healthcare environment. The Alaris System brings a higher level of medication error prevention to the point of patient care." |
1541 | 3e Technologies International, Inc. 9715 Key West Ave, Suite 500 Rockville, MD 20850 USA Harinder Sood TEL: 301-944-1325 FAX: 301-670-6779 CST Lab: NVLAP 200427-0 | 3e-523-3 Secure Multi-function Wireless Data Point (Hardware Version: 2.0(a); Firmware Version: 4.5) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 04/29/2011 08/12/2016 | 8/11/2021 | Overall Level: 2 -Cryptographic Module Ports and Interfaces: Level 3 -Roles, Services, and Authentication: Level 3 -Design Assurance: Level 3 -Mitigation of Other Attacks: N/A -Tested Configuration(s): N/A -FIPS Approved algorithms: AES (Certs. #1021, #1022 and #1023); HMAC (Certs. #570, #571 and #572); DRBG (Cert. #1136); RSA (Cert. #490); SHS (Certs. #975, #976 and #977); KTS (AES Cert. #1021 and HMAC Cert. #570; key establishment methodology provides between 128 and 256 bits of encryption strength) -Other algorithms: RSA (key wrapping, key establishment methodology provides 112 bits of encryption strength); MD5; NDRNG; RC4; WEP Multi-Chip Embedded "The 3e-523-3 operates as either a gateway connecting a local area network to wide area network (WAN), an access point within a wireless local area network (WLAN), a client within a WLAN, or a wireless bridging device. 3eTI software provides the following major services in FIPS mode: Wireless 802.11a/b/g Access Point functionality; Wireless 802.11a/b/g Client functionality; Wireless 802.11a/b/g Bridge functionality; Wireless 802.11a/b/g Mesh functionality (auto-forming, self-healing wireless capability); IEEE 802.11i." |
1530 | CST Lab: NVLAP 200802-0 | Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 04/04/2011 10/10/2012 05/13/2013 12/13/2013 07/11/2014 03/20/2015 07/24/2015 08/13/2015 09/28/2015 11/18/2015 03/18/2016 | 3/17/2021 | Overall Level: 2 Multi-chip standalone |
1504 | DataLocker Inc. 7007 College Blvd Suite 240 Overland Park, KS 66211 USA Jay Kim TEL: 913-310-9088 CST Lab: NVLAP 200658-0 | DataLocker Enterprise, V2.0 (DataLocker DL2) (Hardware Versions: P/Ns DL500E2 and DL1000E2; Firmware Version: 2.30) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 02/24/2011 03/01/2011 06/10/2016 07/05/2016 | 7/4/2021 | Overall Level: 1 -Roles, Services, and Authentication: Level 2 -EMI/EMC: Level 3 -FIPS Approved algorithms: AES (Cert. #250) -Other algorithms: N/A Multi-chip standalone "The DataLocker Enterprise (also named DataLocker DL2) is a fully platform independent, portable encrypted hard drive. Compatible with MAC, Windows and Linux systems, the DataLocker operates without any host based software or drivers. It utilizes an embedded LCD touch screen interface for all authentication and administrative functions. The device is fully 256bit AES CBC Mode encrypted via a dedicated crypto engine." |
1497 | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 USA Global Certification Team CST Lab: NVLAP 200427-0 | Cisco Secure Access Control Server (ACS) FIPS module (NSS) (Software Versions: 3.12.5 and 3.12.5.1) (When operated in FIPS mode) Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Software | 02/10/2011 02/23/2012 04/05/2013 | 4/4/2018 | Overall Level: 1 -Tested Configuration(s): Tested as meeting Level 1 with Cisco CARS 1.2.0.182 (single-user mode) -FIPS Approved algorithms: AES (Cert. #1475); DRBG (Cert. #59); DSA (Cert. #466); HMAC (Cert. #868); RSA (Cert. #722); SHS (Cert. #1334); Triple-DES (Cert. #993) -Other algorithms: Camellia; DES; Diffie-Hellman; EC Diffie-Hellman; MD2; MD5; RC2; RC4; SEED Multi-chip standalone "The Cisco Secure Access Control Server (ACS) FIPS module (NSS) Version 3.12.5 is a software cryptographic library that provides cryptographic services to the Cisco Access Control Server (ACS) application. The Cisco ACS FIPS module (NSS) is a general-purpose cryptographic library, with an API based on the industry standard PKCS #11 version 2.20." |
1495 | CST Lab: NVLAP 100432-0 | Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy | Hardware | 02/28/2011 06/08/2012 10/15/2012 | 10/14/2017 | Overall Level: 2 Multi-chip standalone |