This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Version
1.0.1
Type
SOFTWARE
Vendor
Ixia, a Keysight Business
8310 N Capital of Texas Hwy
Austin, TX 78731
United States
Contacts
Fred Strelzoff
fred.strelzoff@keysight.com
(512) 600-5400

SHS 4693 Expand All First Validated: 11/9/2018

Operating Environment Algorithm Capabilities
Linux 4.12.0 on Intel Core i7-3555LE SHA-1 Expand
Linux 4.12.0 on Intel Core i7-3555LE Expand
    SHA-1 Expand
    Linux 4.12.0 on Intel Core i7-3555LE Expand
      SHA-224 Expand
      Linux 4.12.0 on Intel Core i7-3555LE SHA-224 Expand
      Linux 4.12.0 on Intel Core i7-3555LE SHA-256 Expand
      Linux 4.12.0 on Intel Core i7-3555LE Expand
        SHA-256 Expand
        Linux 4.12.0 on Intel Core i7-3555LE Expand
          SHA-384 Expand
          Linux 4.12.0 on Intel Core i7-3555LE SHA-384 Expand
          Linux 4.12.0 on Intel Core i7-3555LE SHA-512 Expand
          Linux 4.12.0 on Intel Core i7-3555LE Expand
            SHA-512 Expand
            Linux 4.12.0 on Intel Core i7-3555LE Expand
              SHA-512/224 Expand
              Linux 4.12.0 on Intel Core i7-3555LE SHA-512/224 Expand
              Linux 4.12.0 on Intel Core i7-3555LE SHA-512/256 Expand
              Linux 4.12.0 on Intel Core i7-3555LE Expand
                SHA-512/256 Expand

                Created October 05, 2016, Updated November 24, 2020