This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Version
1.0.1
Type
SOFTWARE
Vendor
Ixia, a Keysight Business
8310 N Capital of Texas Hwy
Austin, TX 78731
United States
Contacts
Fred Strelzoff
fred.strelzoff@keysight.com
(512) 600-5400

SHA-3 63 Expand All First Validated: 11/9/2018

Operating Environment Algorithm Capabilities
Linux 4.12.0 on Intel Core i7-3555LE SHA3-224 Expand
Linux 4.12.0 on Intel Core i7-3555LE Expand
    SHA3-224 Expand
    Linux 4.12.0 on Intel Core i7-3555LE Expand
      SHA3-256 Expand
      Linux 4.12.0 on Intel Core i7-3555LE SHA3-256 Expand
      Linux 4.12.0 on Intel Core i7-3555LE SHA3-384 Expand
      Linux 4.12.0 on Intel Core i7-3555LE Expand
        SHA3-384 Expand
        Linux 4.12.0 on Intel Core i7-3555LE Expand
          SHA3-512 Expand
          Linux 4.12.0 on Intel Core i7-3555LE SHA3-512 Expand
          Linux 4.12.0 on Intel Core i7-3555LE SHAKE-128 Expand
          Linux 4.12.0 on Intel Core i7-3555LE Expand
            SHAKE-128 Expand
            Linux 4.12.0 on Intel Core i7-3555LE Expand
              SHAKE-256 Expand
              Linux 4.12.0 on Intel Core i7-3555LE SHAKE-256 Expand

              Created October 05, 2016, Updated November 24, 2020