Validating the reliability of intel solid state drives

6854933580_2c8b688306_z

VPN, Smart Card, USB memory token, etc.) or the module is embedded in a larger product or application (e.g. If the module is embedded in a product or application, ask the product or application vendor to provide a signed letter or statement affirming that the unmodified validated cryptographic module is integrated in the solution; the module provides all the cryptographic services in the solution; and provide reference to the modules validation certificate number from this listing. #2932 operating in FIPS mode or Bit Locker(R) Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #4354, #4355, #4356, #4357, #4358, #4359, #4360 and #4361); CVL (Certs. The model included is the CN9100 100G Ethernet Encryptor, operating at a line rate of 100Gb/s. #1116, key agreement; key establishment methodology provides 128 and 192 bits of encryption strength); MD5; NDRNG Multi-Chip Stand Alone"Cisco Aironet Series Wireless Access Points provide highly secure and reliable wireless connections for both indoor and outdoor environments." 1-Physical Security: N/A-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode) AES (Certs. #3993, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; DES; DSA (non-compliant); HMAC-MD5; HMAC-SHA-1-96 (non-compliant); MD5; PRNG Multi-Chip Stand Alone"GGM 8000 devices are versatile, secure-capable devices that can ensure timely delivery of delay-sensitive traffic. #816 and #817; vendor affirmed); KAS (SP 800-56Arev2 with CVL Certs. Installed in front of equipment, the Crypto Mod encrypts traffic for the entire length of an industrial network. ABCD device and a terminal server, so it can fit any existing industrial network. Application developers wishing to use the CCL can use the CCL's Application Programming Interface (API) to perform AES, ECDSA, HMAC, DRBG, SHA256 and SHA512 security related functions. #704, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARC4 (RC4); Blowfish; Camellia; CAST5; DES; DSTU4145; El Gamal; GOST28147; GOST3410-1994; GOST3410-2001; GOST3411; HMAC-GOST3411; HMAC-MD5; HMAC-RIPEMD; HMAC-TIGER; HMAC-WHIRLPOOL; IDEA; KBKDF (non-compliant); PBKDF (non-compliant); RC2; RIPEMD; PRNG; Scrypt; SEED; Serpent; Sip Hash; SHACAL-2; TIGER; Twofish; WHIRLPOOL Multi-Chip Stand Alone"CTERA Crypto Module™ (Java) is a secure cryptographic engine used by CTERA Enterprise File Services Platform. #53); KAS (SP 800-56B, vendor affirmed); KBKDF (Cert. This is a SRIOV capable PCIe adapter and can be used in a virtualization environment to extend services like virtual key management, crypto and TLS offloads to VMs in dedicated I/O channels. These identification technologies, found in Palo Alto Networks' enterprise firewalls, enable enterprises to create business-relevant security policies - safely enabling organizations to adopt new applications, instead of the traditional "all-or-nothing" approach offered by traditional port-blocking firewalls used in many security infrastructures."Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive(Hardware Versions: ST4000NM0131[1], ST4000NM0121[2], ST900MP0126[3,4,5], ST600MP0026[6,7,8], ST900MP0166[9,10], ST600MP0156[11,12], ST10000NM0246[13] and ST10000NM0236[14]; Firmware Versions: BE53[1], BE52[2], NF02[3,6], KSC4[4,7], KSC5[5,8], CF02[9,11], CFA2[10,12], KF01[13] and EF01[14]) AES (Certs. #2565 and #2613); PBKDF (vendor affirmed); RSA (Certs. These products meet the performance requirements of the most demanding Enterprise applications. The device supports onboard hardware random number generation, RSA, HMAC and algorithms." NDRNG Single-chip"The Cubic Managed Asset Tag Cryptographic Module and Cubic SINK Cryptographic Module securely sends and receives information collected from peripheral sensors to/from an external Cubic Gateway in support of Cubic Mist® mesh networking solutions." 1-Roles, Services, and Authentication: Level 2-Design Assurance: Level 3-Tested Configuration(s): Tested as meeting Level 1 with Oracle® JRE 7.0 on Microsoft® Windows 7™ (64-bit) running on Dell™ Dimension C521 JRE 6.0 on Android 2.2 ARM (32-bit) running on Lenovo® Thinkpad® T61 (single-user mode) AES (Cert. #2014, key wrapping); HWRBG Multi-chip standalone"The Datacryptor® Gig Ethernet and 10 Gig Ethernet are rack-mountable multi-chip standalone cryptographic modules designed to secure data transmissions across public Ethernet Layer 2 networks. #37 and #38, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)); AES (Certs.

NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. #2933 operating in FIPS mode) 1-Physical Security: N/A-Design Assurance: Level 2-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA Windows Server 2016 Standard Edition (x64) running on a Dell Power Edge R630 Server with PAA Windows Server 2016 Datacenter Edition (x64) running on a Dell Power Edge R630 Server with PAA Windows Storage Server 2016 (x64) running on a Dell Power Edge R630 Server with PAA Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode) AES (non-compliant); MD5 Multi-Chip Stand Alone"Code Integrity (ci.dll) verifies the integrity of executable files, including kernel mode drivers, critical system components, and user mode cryptographic modules as they are loaded into memory from the disk."Bit Locker® Dump Filter (dumpfve.sys) in Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016(Software Version: 10.0.14393)(When operated in FIPS mode with the module Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 under Cert. #1053, #1054, #1056, #1057, #1059, #1060, #1062, #1063, #1065, #1067, #1068, #1069, #1085, #1086, #1087, #1088, #1089, #1090 and #1091); DRBG (Certs. Data privacy is provided by FIPS approved AES CTR algorithms." 1-Physical Security: N/A-Mitigation of Other Attacks: N/A-Tested Configuration(s): Red Hat Enterprise Linux 7.1 running on an ASUS Desktop PC M51AC-US002S Windows Server 2012 R2 running on an ASUS Desktop PC M51AC-US002S (single-user mode) N/A Multi-Chip Stand Alone"Vormetric Application Encryption is a library to simplify integrating application-level encryption into existing corporate applications. #4354, #4355, #4356, #4357, #4358, #4359, #4360, #4361, #4370, #4371, #4372, #4373, #4374 and #4375); CVL (Certs. Supporting secure integrated voice and data applications as well as high-speed site-to-site WAN connections, GGM 8000 perform simultaneous functions - including compression and data prioritization - without compromising their ability to accomplish additional packet-handling functions as needed. It provides authentication for controlling network access, integrity when data is in motion, and confidentiality. It has a hardware watchdog timer and the capability for remote configuration, management, and updates." AES (Cert. It also includes non-validated legacy services to support DES encryption while operating in the Non-Approved mode of operation." 1-Physical Security: N/A-Mitigation of Other Attacks: N/A-Tested Configuration(s): Windows 7 Professional 32-bit running on an Intel® Core™2 Duo P9600 @ 2.53GHz system without PAA Windows 8.1 Enterprise 64-bit running on an Intel® Core™ i7-3770S CPU @ 3.10GHz system with PAA Windows 7 Enterprise 64-bit running on an Intel® Core™ i5-2400 CPU @ 3.10GHz system with PAA Windows 8.1 Enterprise 64-bit running on an Intel® Core™ i7-4770 CPU @ 3.40GHz system with PAA Windows 10 Enterprise 64 bit running on an Intel(R) Core(TM) i7-4600U CPU @ 2.10GHz system with PAA (single-user mode) AES (Certs. #502, #561, #890, #891, #896 and #897); HMAC (Certs. The platform enables organizations to securely sync, serve and protect data on any private or public cloud infrastructure."(When operated in FIPS mode with module Cryptographic Primitives Library (and ncryptsslp.dll) in Microsoft Windows 8.1 Enterprise, Windows Server 2012 R2, Windows Storage Server 2012 R2, Surface Pro 3, Surface Pro 2, Surface Pro, Surface 2, Surface, Windows RT 8.1, Windows Phone 8.1, Windows Embedded 8.1 Industry Enterprise, Stor Simple 8000 Series validated to FIPS 140-2 under Cert. This product is suitable for PKI vendors, SSL servers/load balancers." EC Diffie-Hellman (CVL Cert. #1343, #2841, #2947, #3759, #3760 and #3940); CVL (Certs. The cryptographic module (CM) provides a wide range of cryptographic services using FIPS approved algorithms. The Gig Ethernet uses an SFP transceiver and the 10 Gig Ethernet uses a higher-speed XFP transceiver. #2282; non-compliant); CAST5; CAST5-MAC; CAST5-ECB; CAST5-CBC; DES; DES MAC; DES-ECB; DES-CBC; GENERIC-SECRET; HAS-160; KCDSA; MD2; MD5; RC2; RC2-MAC; RC2-ECB; RC2-CBC; RC4; RC5; RC5-MAC; RC5-ECB; RC5-CBC; RSA (X-509; non-compliant); SEED; SSL3-MD5-MAC; SSL3-SHA1-MAC; SSL PRE-MASTER; Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 152 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA OAEP (key wrapping; key establishment methodology provides between 112 and 152 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (Certs. #2240 and #2241, key wrapping; key establishment methodology provides 128 or 256 bits of encryption strength) Multi-chip standalone"Stonesoft Cryptographic Library is a software module that provides cryptographic services for Stonesoft network security products." NDRNG; AES (Cert.

The descriptions do not imply endorsement by the U. The algorithms, protocols, and cryptographic functions listed as "other algorithms" (e.g. #2227) HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) Multi-Chip Stand Alone"The Cryptographic Primitives Library (and ncryptsslp.dll) provides cryptographic services to Windows components and applications. #2935 operating in FIPS mode) 1-Physical Security: N/A-Design Assurance: Level 2-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA Windows Server 2016 Standard Edition (x64) running on a Dell Power Edge R630 Server with PAA Windows Server 2016 Datacenter Edition (x64) running on a Dell Power Edge R630 Server with PAA Windows Storage Server 2016 (x64) running on a Dell Power Edge R630 Server with PAA Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode) AES (Certs. #1390, #1391, #1392, #1393, #1394, #1395, #1396 and #1397); DSA (Certs. The application encryption library provides a set of documented standard-based APIs used to perform cryptographic and encryption key management operations. #1055, #1058, #1061, #1064, #1066, #1068 and #1070); DRBG (Certs. In addition to the normal packet forwarding functions, the GGM 8000 supports data encryption and authentication over Ethernet and Frame Relay links using the IPSec and FRF.17 protocols." AES (Certs. #1789 and #1879); PBKDF (vendor affirmed); RSA (Certs. #73); KAS (SP 800-56Arev2, vendor affirmed); KBKDF (Cert. #3756; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2357 operating in FIPS mode or Black Berry OS Cryptographic Library validated to FIPS 140-2 under Cert. #931, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES XTS (AES Cert. Services include hardware-based data encryption (AES-XTS), instantaneous user data disposal with cryptographic erase, independently controlled and protected user data LBA bands and authenticated FW download. The Datacryptor® employs an automatic key generation and exchange mechanism using X.509 v3 certificates and the Elliptic Curve Diffie-Hellman key agreement scheme. #1386 and #1398); Triple-DES MAC (Triple-DES Certs. #1756, #2262 and #2282, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); Triple-DES (Certs. #1810, key wrapping; key establishment methodology provides 256 bits of encryption strength) Multi-chip embedded"Atos Worldline’s Adyton is an innovative high-performance Hardware Security Module (HSM) platform.

allowed or non-FIPS-Approved algorithms) have not been tested through the CMVP. NOTE3: All questions regarding the implementation and/or use of any module located on the CMVP module validation lists should first be directed to the appropriate vendor point-of-contact (listed for each entry). #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. It includes cryptographic algorithms in an easy-to-use cryptographic module via the Cryptography Next Generation (CNG) API. #4061 and #4064)Multi-Chip Stand Alone"The Bit Locker® Dump Filter (dumpfve.sys) is the full volume encryption filter that resides in the system dump stack. #2372) Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #1156, #1157, #1158, #1159, #1160, #1161 and #1162); ECDSA (Certs. The innovative product design enables developers to choose to standard AES encryption or schema maintaining Format Preserving Encryption (FPE). #1390, #1391, #1392, #1393, #1394, #1395, #1396 and #1397); DSA (Certs. #1007, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1007, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES GCM (AES Certs. #1490 and #1558); SHA-3 (vendor affirmed); SHS (Certs. #2090; key establishment methodology provides 112 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #1578 operating in FIPS mode) 1-Physical Security: N/A-Mitigation of Other Attacks: N/A-Tested Configuration(s): Black Berry OS 10.3 running on Qualcomm Snapdragon 801 Black Berry OS 10.3 running on Qualcomm Snapdragon S4 Microsoft Windows Server 2012 R2 (64-bit) running on Intel Xeon E5530 (single-user mode) N/A Multi-Chip Stand Alone"KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Suite B-compliant, standards based, AES/GCM-256 layer of encrypted communications between a Black Berry Enterprise Server (BES) and a Black Berry Mobile Set (MS) with Elliptic Curve (EC) key exchange used to negotiate symmetric keys."NITROXIII CNN35XX-NFBE HSM Family(Hardware Versions: P/Ns CNL3560P-NFBE-G, CNL3560-NFBE-G, CNL3530-NFBE-G, CNL3510-NFBE-G, CNL3510P-NFBE-G, CNN3560P-NFBE-G, CNN3560-NFBE-G, CNN3530-NFBE-G and CNN3510-NFBE-G; Firmware Version: CNN35XX-NFBE-FW-2.0 build 74) AES (Certs. #4124; non-compliant); PRNG Multi-Chip Stand Alone"The Symantec Messaging Gateway Cryptographic Module provides cryptographic functions for the Messaging Gateway platforms software. #3924, key wrapping; key establishment methodology provides 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 128 bits of encryption strength) Multi-Chip Stand Alone"The Talon provides ultra-high securtiy standards compliant approach to delivery of high definition real time video, control signaling and physical security data over an IP network. The services are provided throug"STMicroelectronics Green Square Building B Lambroekstraat 5 Diegem/Machelen B-1831Belgium Olivier COLLARTTEL: 32 272 450 77FAX: 32 272 451 43Xavier BOUSSINTEL: 33 223 470 695FAX: 33 223 470 400CST Lab: NVLAP 200002-0 AES (Cert. The algorithm used for securing data transmission is AES-256 GCM." HWRBG Multi-chip standalone"The Datacryptor® 1 Gig Ethernet and 10 Gig Ethernet are rack-mountable multi-chip standalone cryptographic modules which facilitate secure data transmission across public Ethernet Layer 2 networks. #1137, #1414 and #1430, vendor-affirmed); Triple-DES (Certs. #1137, #1414 and #1430, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) Multi-chip embedded"The Luna® PCI-E for Luna® IS cryptographic module features powerful cryptographic processing and hardware key management for applications where performance and security are the priority. The design of the Adyton is based on high security, reliability and robustness, user friendliness, and conformance to international security standards.

It is important to note that the items on this list are cryptographic modules. NET framework 4.6.1 running on a Lenovo Flex 3 Windows 10 Pro on . No assurance of the minimum strength of generated keys) 1-Physical Security: N/A -Mitigation of Other Attacks: N/A -Tested Configuration(s): Tested as meeting Level 1 with Tested as meeting Level 1 with HP-UX 11i v3 running on an HP Integrity BL860c i2 server blade (single user mode) RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength) Multi-chip standalone"HP-UX Kernel Crypto Module (HP-UX KCM) is a kernel-space crypto engine in the HP-UX operating system containing core cryptographic algorithms and operations in a single shared library. #1419, key wrapping; key establishment methodology provides 112-bits of encryption strength; non-compliant less than 112 bits of encryption strength) Single-chip"The Hi COS PKI native smart card module is a single chip implementation of a cryptographic module. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements." 1-Design Assurance: Level 3-Tested Configuration(s): Tested as meeting Level 1 with Oracle® JRE 7.0 on Microsoft® Windows 7™ (64-bit) running on Dell™ Dimension C521 JRE 6.0 on Android 2.2 ARM (32-bit) running on Lenovo® Thinkpad® T61 (single-user mode) AES (Cert. The module generates cryptographic keys whose strengths are modified by available entropy; No assurance of the minimum strength of generated keys.) 1-Design Assurance: Level 3-Tested Configuration(s): Tested as meeting Level 1 with Windows Server 2008R2 64-bit running on Dell Power Edge R210II with PAA Windows Server 2008 64-bit running on Dell Power Edge R210II Windows 7 64-bit running on a Acer Aspire AS5750 with PAA Windows 7 32-bit running on a Acer Aspire AS5750 Net BSD 4.0 32-bit on Vmware ESX running on Dell Power Edge R210II with PAA Android 4.0 running on Beagleboard x M with PAA RHEL 6.2 64-bit running on a Dell Power Edge R210II with PAA Cent OS 5.6 32-bit running on a Dell Power Edge 860 (Single User Mode) RSA (key wrapping; key establishment methodology provides between 80 and 256 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength); RNG (non-compliant); DRBG (non-compliant) Multi-chip standalone"The Safe Net Software Cryptographic Library is Safe Net's cryptographic service provider that provides extended high performance cryptographic services for Safe Net's broad range of Data Protection products." AES (Cert. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more." 1-Tested Configuration(s): Tested as meeting Level 1 with Integrity O/S 5.0 running on Freescale MPC8544ADS Development System i OS-5 running on Apple i Pad 2 i OS-6 running on Apple i Pad 2 (single-user mode) Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; DES; Blowfish; ARC2; ARC4; MD2; MD4; MD5; HMAC-MD5; AES EAX (non-compliant); AES XCBC (non-compliant); RSA (encrypt/decrypt); RNG; Dual EC DRBG Multi-chip standalone"The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system.

A module may either be an embedded component of a product or application, or a complete product in-and-of-itself. #3993, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; DES; DSA (non-compliant); HMAC-MD5; HMAC-SHA-1-96 (non-compliant); MD5; PRNG Multi-Chip Stand Alone"MNR S6000 routers are versatile, secure-capable devices that can ensure timely delivery of delay-sensitive traffic. NET framework 4.6.1 running on an Asus T100HA (single-user mode) AES (Cert. It implements asymmetric, symmetric, and digest operations that are used by HP-UX security solutions. The Hi COS PKI native smart card module is mounted in an ID-1 class smart card body that adheres to ISO/IEC specifications for Integrated Circuit Chip (ICC) based identification cards. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. #2189, key wrapping); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); NDRNG Multi-chip standalone"HP LTO-6 tape drives help to keep pace with data growth with up to 6.25TB compressed data storage per cartridge and capable of compressed data transfer rates of up to 400MB/sec.

Increase the speed, durability, and efficiency of your system for years to come with the Crucial MX300 SSD.

validating the reliability of intel solid state drives-51validating the reliability of intel solid state drives-83validating the reliability of intel solid state drives-11

In much the same way a rechargeable battery loses its charge after several hundred cycles, non-volatile SSDs can lose their ability to retain data after thousands of write/erase cycles.Most SSDs use complicated controller technology to extend the reliability and speed of storage.The architecture inside a high performance SSD is more complicated than that in most RAID systems.If the cryptographic module is a component of a larger product or application, one should contact the product or application vendor in order to determine how the product utilizes the embedded validated cryptographic module. Supporting secure integrated voice and data applications as well as high-speed site-to-site WAN connections, S6000 routers perform simultaneous functions - including compression and data prioritization - without compromising their ability to accomplish additional packet-handling functions as needed. CN6010 Series: A6010B (AC), A6011B (DC) and A6012B (AC/DC); Firmware Version: 2.7.1) AES (Certs. HP-UX KCM is available on HP-UX 11i v3 operating system on the HP Integrity Platform (IA-64)." NDRNG Multi-chip embedded"The ES-1200 is a low cost, size, weight & power multichip programmable embedded cryptographic module. The module consists of the chip (ICC), the contact faceplate, and the electronic connectors between the chip and contact pad, all contained within an epoxy substrate." 1-Physical Security: N/A -Mitigation of Other Attacks: N/A -Tested Configuration(s): Tested as meeting Level 1 with Windows Server 2008 R2 on a Dell Opti Plex 755 Cent OS 6.3 on a Dell Opti Plex 755 (single-user mode) RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG Multi-chip standalone"The Common Crypto Module for PRIISMS, PRIISMS RD, SA5600-IA, and Net Gard MFD is a standards-based cryptographic engine for servers and appliances. Ground breaking LTFS technology makes LTO-6 tapes as easy to use as disk and enables easy file access, reliable long term archive retrieval and simpler transportability between systems.There may be a larger number of security products or applications available which use an embedded validated cryptographic module, than the number of modules which are found in this list. In addition to the normal routing functions, the MNR S6000 supports data encryption and authentication over Ethernet and Frame Relay links using the IPSec and FRF.17 protocols." AES (Certs. #1096, #1099, #1100, #1101 and #1102); ECDSA (Certs. #2647, #2648, #2653, #2654, #2655 and #2656); RSA (Certs. #3342, #3343, #3349, #3350, #3351 and #3352); Triple-DES (Certs. CN4000 Series: A4010B (DC), A4020B (DC); Senetas Corp. It provides encryption and decryption services, plaintext bypass, key management, and PIN-based access control. The module delivers core cryptographic functions and features robust algorithm support, including Suite B algorithms."Kanguru Defender Elite 200™(Hardware Versions: 1.0 (P/Ns KDFE200‐4G-Red, KDFE200-4G‐Green, KDFE200‐4G‐Blue, KDFE200-4G-Yellow, KDFE200-4GBrown, KDFE200‐4G‐Gray, KDFE200-4G‐Silver, KDFE200‐8G‐Red, KDFE200-8G-Green, KDFE200‐8G‐Blue, KDFE200- 8G‐Yellow, KDFE200-8G‐Brown, KDFE200-8G‐Gray, KDFE200-8G‐Silver, KDFE200-16G‐Red, KDFE200-16G‐Green, KDFE200‐16G‐Blue, KDFE200-16G‐Yellow, KDFE200-16G‐Brown, KDFE200-16G‐Gray, KDFE200-16G‐Silver, KDFE200- 32G‐Red, KDFE200-32G-Green, KDFE200-32G‐Blue, KDFE200-32G‐Yellow, KDFE200-32G‐Brown, KDFE200-32G‐Gray, KDFE200‐32G‐Silver, KDFE200‐64G‐Red, KDFE200-64G‐Green, KDFE200‐64G‐Blue, KDFE200-64G‐Yellow, KDFE200-64G‐Brown, KDFE200-64G‐Gray, KDFE200-64G‐Silver, KDFE200-128G-Red, KDFE200-128G‐Green, KDFE200-128G-Blue, KDFE200-128G-Yellow, KDFE200-128G‐Brown, KDFE200-128G-Gray, KDFE200‐128G-Silver); Firmware Versions: 2.03.10 and 2.05.10)) NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength) Multi-chip standalone"The Kanguru Defender Elite 200™ is a 256-bit AES hardware encrypted USB flash drive. LTO-6 tape drives also provide easy-to-enable security to protect the most sensitive data and prevent unauthorized access of tape cartridges with AES 256-bit hardware data encryption." HWRBG Multi-chip standalone"The Datacryptor® SONET/SDH OC-3/12/48/192C are rack-mountable multi-chip standalone cryptographic modules which facilitate secure data transmission across public SONET or SDH backbone networks.Howdy, In the weeks since the release of Windows Server 2016, the amount of interest we’ve seen in Storage Spaces Direct has been nothing short of spectacular.This interest has translated to many potential customers looking to evaluate Storage Spaces Direct.In addition, other vendors, who are not found in this list, may incorporate a validated cryptographic module from this list embedded into their own products. #2227) HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt) Multi-Chip Stand Alone"Kernel Mode Cryptographic Primitives Library (cng.sys) runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows kernel components. #1357, #1358 and #2891) MD5; NDRNG; PRNG; SNMP KDF (non-compliant); TLS KDF (non-compliant) Multi-Chip Stand Alone"The Fortress Mesh Point is an all-in-one network access device housed in a rugged compact chassis, with the most stringent security available today built in. #4055, #4056, #4066, #4067, #4068 and #4069); CVL (Certs. #2217, #2218, #2219, #2220, #2223 and #2224) Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); HMAC-SHA-1-96 (HMAC Certs. #3985; key establishment methodology provides between 128 and 256 bits of encryption strength); SHS (Cert. #1311 and #2242) MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); PBE; RC4 Multi-Chip Embedded"CNN35XX-NFBE HSM Family is a high performance purpose built solution for key management and crypto acceleration compliance to FIPS 140-2. #2614; key establishment methodology provides 128 bits of encryption strength); RSA (Cert. #3305 and #3306) NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); MGF1 Single Chip"ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 specification."Senetas Corporation Ltd, distributed by Gemalto NV (Safe Net)312 Kings Way South Melbourne, Victoria 3205Australia John Weston TEL: 61 3 9868 4555FAX: 61 3 9821 4899Laurie Mack TEL: 613-221-5065FAX: 613-723-5079CST Lab: NVLAP 200996-0CN Series Ethernet Encryptors(Hardware Versions: Senetas Corp. CN4000 Series: A4010B (DC), A4020B (DC); Senetas Corp. CN6010 Series: A6010B (AC), A6011B (DC) and A6012B (AC/DC); Senetas Corp. The ES-1200 is intended for use in environments where FIPS 140-2 Level 2 cryptographic products are required. It is used to securely store sensitive data housed on the device. The devices use standard SFP/XFP optical transceivers for their host and network connections.When selecting a module from a vendor, verify that the module is either the product or application itself (e.g. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. It supports several cryptographic algorithms accessible via a FIPS function table request IRP (I/O request packet)."Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016(Software Version: 10.0.14393)(When operated in FIPS mode with modules Bit Locker(R) Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #3605, #3606, #3607 and #3609, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Certs.#2007 and #2008, key wrapping; key establishment methodology provides 112 bits of encryption strength); Camellia; DES; JPAKE; MD2; MD5; RC2; RC4; RC5; SEED; Multi-Chip Stand Alone"The Hewlett Packard Enterprise NSS Crypto Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for Hewlett Packard Enterprise components." 1-Physical Security: N/A-Mitigation of Other Attacks: N/A-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode) AES (Certs. It can serve as a wireless bridge, a WLAN access point, and an eight-port LAN switch, while performing all the functions of a Fortress controller device: encrypting wireless traffic and providing Multi-factor Authentication for devices on the network it protects." 1-Physical Security: N/A-Mitigation of Other Attacks: N/A-Tested Configuration(s): Tested as meeting Level 1 with Linux kernel 3.13 32 bit on running on HP Elite Desk (Intel Core i7) (gcc Compiler Version 4.8.2) (single-user mode) NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); DES; RSA (encrypt/decrypt) Multi-Chip Stand Alone"Panasonic Cryptographic Module provides high performance cryptographic processing for embedded devices."Senetas Corporation Ltd, distributed by Gemalto NV (Safe Net)312 Kings Way South Melbourne, Victoria 3205Australia John Weston TEL: 61 3 9868 4555FAX: 61 3 9821 4899Laurie Mack TEL: 613-221-5065FAX: 613-723-5079CST Lab: NVLAP 200996-0 Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 150 bits of encryption strength) Multi-Chip Stand Alone"The CN9000 Series Encryptors are high-speed hardware encryption platforms that secure data over optical Ethernet networks. #4409; key wrapping; key establishment methodology provides 128 and 256 bits of encryption strength); RSA (Certs. #3576, #3604, and #3635) Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #39, #2606, and #2607); KAS (SP 800-56Arev2 with CVL Certs. #2647, #2648, #2653, #2654, #2655 and #2656); NDRNG; ARCFOUR; Blowfish; CAST; DSA (non-compliant); HMAC-MD5; HMAC-RIPEMD160; UMAC Multi-Chip Stand Alone"Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers." Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); PBKDF (non-compliant) Multi-Chip Stand Alone"Auto Sol’s Crypto Mod is an end-point security device that protects data exchanged between remote industrial field devices and a centralized SCADA host. #3290) DES Multi-Chip Stand Alone"The CCL is a dynamically linked library implemented using the C programming language with an external Java interface. #2242; key establishment methodology provides 112 bits of encryption strength); RSA (Certs. The module supports flexible key store that can be partitioned up to 32 individually managed and isolated partitions. #4020, key wrapping; key establishment methodology provides 128 or 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Blowfish; Camellia; CAST; DES; DSA (non-compliant); EC Diffie-Hellman (non-compliant); HMAC-MD5; HMAC-RIPEMD; RC2; RC4; RIPEMD; SEED; Triple-DES (non-compliant); UMAC Multi-Chip Stand Alone"The Palo Alto Networks PA-3060 and PA-7080 firewalls provide network security by enabling enterprises to see and control applications, users, and content using three unique identification technologies: App-ID, User-ID, and Content-ID. #852, key agreement; key establishment methodology provides 112 bits of encryption strength); NDRNG Multi-Chip Embedded"The Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive FIPS 140-2 Module is embodied in Seagate Enterprise Performance SED model disk drives. Typical applications are military Transmission Security (TRANSEC), Communications Security (COMSEC), and Data-At-Rest (DAR) using Suite B cryptography."Gold Key Security Corporation26900 E Pink Hill Road Independence, MO 64057USA Gold Key Sales & Customer Service TEL: 816-220-3000FAX: 419-301-3208Jon Thomas TEL: 567-270-3830FAX: 419-301-3208CST Lab: NVLAP 200658-0 AES (Cert. It can also be used as a secure platform for remote access and virtualized applications run directly from the device. The Datacryptor® offers user verification services via ECDSA enabled X.509 v.3 certificates, key management based on a Elliptic Curve Diffie-Hellman key agreement scheme, and AES encryption of data passing over public networks." AES (Cert. #37 and #38, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs.This creates the wrong impression that data is much safer on an SSD. SSDs are more vulnerable to some defects than typical HDDs are, including abrupt power loss, magnetic fields and electric charges.Also, because SSDs have a limited number of write cycles, the ability to write to them will eventually wear out, leading to potential data loss.

You must have an account to comment. Please register or login here!