This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
IBM Security Network Protection is designed to protect your business critical network infrastructure through a unique combination of threat protection, visibility and control. IBM extends the abilities of traditional intrusion prevention systems by offering a next-generation solution that provides visibility and control over their network.
Version
5.3
Type
SOFTWARE
Vendor
IBM Internet Security Systems
6303 Barfield Road
Atlanta, GA 30328
USA
Contacts
Ferrell Moultrie
fmoultrie@us.ibm.com
(678) 234-4069
Kim Barnes
kcbarnes@us.ibm.com
(404) 238-6024

ECDSA 643 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA KeyGen (186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA KeyVer (186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA SigGen (186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 ECDSA SigVer (186-4) Expand

SHS 2743 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-224 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-256 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-384 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 SHA-512 Expand

HMAC 2102 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA-1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-224 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-256 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-384 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC-SHA2-512 Expand

TDES 1886 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-CBC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-CFB64 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-ECB Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 TDES-OFB Expand

AES 3310 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CBC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CCM Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB1 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB128 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CFB8 Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CMAC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-CTR Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-ECB Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-GCM Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-GMAC Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 AES-OFB Expand

RSA 1694 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA KeyGen (186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigGen (186-4) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigVer (186-2) Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 RSA SigVer (186-4) Expand

DRBG 759 Expand All First Validated: 3/27/2015

Operating Environment Algorithm Capabilities
RHEL 6.3 Linux on Intel Xeon E5-2658v2 Counter DRBG Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 Hash DRBG Expand
RHEL 6.3 Linux on Intel Xeon E5-2658v2 HMAC DRBG Expand

Created October 05, 2016, Updated November 24, 2020