Security Requirements of FIPS PUB 140 & Reconfigurable Hardware. G. Bertoni Politecnico di Milano
|
|
- Lauren King
- 5 years ago
- Views:
Transcription
1 Security Requirements of FIPS PUB 140 & Reconfigurable Hardware G. Bertoni Politecnico di Milano
2 What is FIPS PUB 140? It is a standard, issued by NIST and CSE, to define different levels of security requirements for cryptographic modules. All federal agency that use cryptography shall use modules FIPS 140 compliant 09 Jan
3 What is not FIPS 140 No cryptographic algorithms are defined For these we should refer to other FIPS PUB as FIPS 46 for DES FIPS 180 for SHA FIPS 186 for DSA and ECDSA FIPS 197 for AES Jan
4 History of FIPS140 The first FIPS 140 has been released in 1994, now we refer to that as FIPS 140-1; update of the standard has been issued in May 2001, FIPS Jan
5 What is a cryptographic module A Cryptographic module is the set of hardware, software, and/or firmware that implements Approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary. 09 Jan
6 Glossary CLD Configurable Logic Device RH Reconfigurable Hardware TOE Target of Evaluation CSP Critical Security Parameter 09 Jan
7 How devices are certified? The standard requires the presence of independent certifiers that test the cryptographic module and release the certify or discharge the device. The independent certifiers can not be consultant of the device manufacturer. 09 Jan
8 Security Requirements Area Different category that summarize the security aspect of a cryptographic module For each Area a level of security is reached by the TOE (Target Of Evaluation) The final level of security of the system is defined by the lower level reached, but intermediate result can be released. 09 Jan
9 09 Jan
10 Areas related to Reconfigurable Hardware Some areas of the security requirements are general and do not affect the implementation with Reconfigurable Hardware Since the crypto module can be implemented even in software this mean that there is no special restriction for CLD, a crypto module can reach Level 4 even if it is implemented in CLD. CLD is not a bottleneck for the security requirements of the crypto module 09 Jan
11 Security Requirements and Reconfigurable Hardware Some of the security requirements are connected with the CLD implementation Roles, Services and Authentication Operational environment Mitigation of other attacks 09 Jan
12 Roles, Services and Authentication This area specifies the possibility of performing special task as initialization, tests, status check... It is possible to define some special roles as Maintenance Role, which can perform physical or logical tests. In this case CSP should be zeroized Crypto Officer Role which perform initialization of the device The role does not correspond to an user of the crypto module, it could be performed even by a process 09 Jan
13 Operational Environment The operational environment refers to the management of the components required for the module to operate. The standard allow both modifiable and non modifiable operation environment. The standard focus attention on Operating System, referring to Common Criteria 09 Jan
14 Operational Environment For software and firmware the standard requires: A cryptographic mechanism using an Approved integrity technique (e.g., an Approved message authentication code or digital signature algorithm) shall be applied to all cryptographic software and firmware components within the cryptographic module. 09 Jan
15 Mitigation of other attacks The standard do not addresses to particular attacks, leave the possibility to the developers to release some information about crypto module features against specific attacks. 09 Jan
16 Conclusion There are no specific points in FIPS PUB 140 that should restrict the use of reconfigurable hardware 09 Jan
17 References Jan
FIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationSatisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017
Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP
More informationSymantec Corporation
Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its
More informationIOS Common Cryptographic Module (IC2M)
IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION
More informationFIPS Level 1 Validation March 31, 2011 Version 1.12
KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library Version 3.0 Security Policy FIPS 140-2 Level 1 Validation March 31, 2011 Version 1.12 Table of Contents 1 Introduction... 1 1.1 Acronyms and
More informationIntegral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy
Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT
More informationElaine Barker and Allen Roginsky NIST June 29, 2010
Elaine Barker and Allen Roginsky NIST June 29, 2010 Background: Cryptography is used to protect sensitive information Attackers are becoming smarter, and computers are becoming more powerful Many commonly
More informationHitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy
Hitachi Virtual Storage Platform (VSP) Encryption Board FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016 Copyright Hitachi, 2016 Version 4.0 Page 1 of 19
More informationJuniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.
Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in
More informationProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy
ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationSTS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4
STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4 Inter-4 A Division of Sierra Nevada Corporation December 10, 2008 Copyright Sierra Nevada Corporation 2008. May be reproduced
More informationCerticom Security for Government Suppliers developing products to meet the US Government FIPS security requirement
certicom application notes Certicom Security for Government Suppliers developing products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage of the lucrative
More informationDell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy
Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its
More informationFIPS SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes
More informationBCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.
BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May
More informationFIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module
FIPS 140-2 Security Policy for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module Hardware Version: 88i8925, 88i8922, 88i8945, and 88i8946 Firmware Version: Solaris2-FIPS-FW-V1.0 Document Version:
More informationHydra PC FIPS Sector-based Encryption Module Security Policy
Hydra PC FIPS Sector-based Encryption Module Security Policy Revision Document No. 4 30 March 2010 SPYRUS, Inc. info@spyrus.com> SPYRUS Document No. 550-074001-04 Copyright 2009
More informationDolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.
Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3
More informationFIPS Security Policy
Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided
More informationCanon MFP Security Chip. ISO/IEC Security Policy
Canon MFP Security Chip ISO/IEC 19790 Security Policy Version 1.07 2016/12/26 Canon Inc. 1 Table of Contents 2 List of Figures Date of Issue: 2016/12/26 Figure 1 Exterior of Canon MFP Security Chip (FK4-1731A)...
More informationOracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table
More informationFireEye CM Series: CM-4400, CM-7400, CM-9400
FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886
More informationSecure Cryptographic Module (SCM)
Page 1 of 11 FIPS 140 2 Cryptographic Module Security Policy Secure Cryptographic Module (SCM) Document Version 3.0.4 FIPS 140 2 Non Proprietary JVC KENWOOD Corporation Page 2 of 11 Revision History Date
More informationFIPS Validation Certificate
FIPS 140- Validation Certificate The National Institute of Standards and Technology of the United States of America The Communications Security Establishment of the Government of Canada Certificate No.
More informationSamsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy
Version 1.6 Last Update: 2014-02-11 Trademarks... 3 1. Introduction... 4 1.1. Purpose of the Security Policy... 4 1.2. Target Audience... 4 2. Cryptographic Module Specification... 5 2.1. Description of
More informationCisco VPN 3002 Hardware Client Security Policy
Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationeconet smart grid gateways: econet SL and econet MSA FIPS Security Policy
econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,
More informationEnhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy
Enhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy Document Number 1057314, Rev. 011 Prepared by: ViaSat, Inc. 6155 El Camino Real Carlsbad, CA 92009 Copyright
More informationDolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC
Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3
More informationEgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy
EgoSecure GmbH EgoSecure Full Disk Encryption (FDE) Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.5 06/12/2014 Copyright EgoSecure GmbH, 2014. May be reproduced only
More informationARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1
ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document
More informationeidas compliant Trust Services with Utimaco HSMs
eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas
More informationCryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski
Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski About CygnaCom FIPS and Common Criteria Services Accredited testing laboratories NIAP, NIST, CSEC Professional Services PKI infrastructure
More informationCoSign Hardware version 7.0 Firmware version 5.2
CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and
More informationThis Security Policy describes how this module complies with the eleven sections of the Standard:
Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights
More informationOracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of
More informationSEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9
SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced
More informationVersion 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005
Security Builder R FIPS Java Module Version 2.0 FIPS 140-2 Non-Proprietary Security Policy Certicom Corp. September 27, 2005 c Copyright 2005 Certicom Corp. This document may be freely reproduced and distributed
More informationCryptography. Summer Term 2010
Summer Term 2010 Chapter 2: Hash Functions Contents Definition and basic properties Basic design principles and SHA-1 The SHA-3 competition 2 Contents Definition and basic properties Basic design principles
More informationHughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy
Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network
More informationDell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy
Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 1.3 June 25, 2015 1 Copyright Notice Copyright 2015 Dell Software,
More informationFIPS Non-Proprietary Security Policy
Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely
More informationSilent Circle Mobile Application Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174
More informationIntroduction to FIPS ICMC Steve Weingart. Principal Consultant, CISA, CRISC, TX PI
Introduction to FIPS 140-2 ICMC 2013 Steve Weingart Principal Consultant, CISA, CRISC, TX PI Contents Regulatory Framework Background Explaining the Crypto Module Validation Program What is a Cryptographic
More informationFIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.
FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,
More informationCommonly Accepted Keys and CSPs Initiative. International Cryptographic Module Conference (ICMC) Friday November 6 th, 2015
Commonly Accepted Keys and CSPs Initiative International Cryptographic Module Conference (ICMC) Friday November 6 th, 2015 CGI Group Inc. 2015 Introduction Ryan Thomas FIPS 140-2 Program Manager CGI Global
More informationFIPS Security Policy UGS Teamcenter Cryptographic Module
FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product
More informationRSA BSAFE Crypto-C Micro Edition Security Policy
Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security
More informationWatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702
WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702 FIPS 140-2 Non-Proprietary Security Policy Policy Version 1.0.3 Last Updated:
More informationSecurity Policy. 10 th March 2005
DCAP Security Module FIPS 140-2 Level 3 Security Policy 10 th March 2005 Thales e-security Limited, Meadow View House, Long Crendon, Aylesbury, BUCKS HP18 9EQ United Kingdom Tel. +44 (0) 1844 201800 Fax.
More informationJuniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013
Juniper Networks Pulse Cryptographic Module FIPS 140-2 Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 Copyright 2013 Juniper
More informationThe Keyed-Hash Message Authentication Code Validation System (HMACVS)
The Keyed-Hash Message Authentication Code Validation System (HMACVS) December 3, 2004 Lawrence E. Bassham III National Institute of Standards and Technology Information Technology Laboratory Computer
More informationSeagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy
Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...
More informationMotorola PTP 800 Series CMU Cryptographic Module Security Policy
POINT TO POINT WIRELESS SOLUTIONS GROUP Motorola PTP 800 Series CMU Cryptographic Module Security Policy R. A. Carter Reference: Wednesday 21 March 2012 This document describes the PTP 800 Series FIPS
More informationFireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402
FIPS 140-2 Security Policy v0.5 FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 1.0 Prepared By: Acumen Security 18504
More informationVMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N
More informationFDE itc: Encryption Engine (EE) cpp Functional and Assurance Requirements
FDEiTC-EE-English-00 v0. 0-0- 0 0 FDE itc: Encryption Engine (EE) cpp Functional and Assurance Requirements BEV (Border Encryption Value) - the key(s) (or secret(s)) that is passed from the AA to the EE
More informationHash Function. Guido Bertoni Luca Breveglieri. Fundations of Cryptography - hash function pp. 1 / 18
Hash Function Guido Bertoni Luca Breveglieri Fundations of Cryptography - hash function pp. 1 / 18 Definition a hash function H is defined as follows: H : msg space digest space the msg space is the set
More informationAirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy
AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy FIPS 140-2 Level 2 Validation June 15, 2010 Version 1.4 2004, 2005, 2006, 2007, 2008, 2009, 2010 AirMagnet Inc. All rights reserved.
More informationNIST Cryptographic Toolkit
Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others
More informationFIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points
FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy
More informationSecureD v Security Policy
SecureD v.1.6.1 Security Policy Document Number: SecureD Security Policy 100502DS 02.00 Information Grade: Non-Proprietary Effective Date: 2005-01-10 Updated: 2006-11-01 High Density Devices AS Ballastgata
More informationLexmark PrintCryption TM (Firmware Version 1.3.1)
Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3
More informationMotorola PTP 600 Series Point to Point Wireless Ethernet Bridges
POINT TO POINT WIRELESS SOLUTIONS GROUP Motorola PTP 600 Series Point to Point Wireless Ethernet Bridges R. A. Carter Reference: Thursday 6th October 2011 This document describes the PTP 600 Series FIPS
More informationInside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016
Inside the World of Cryptographic Algorithm Validation Testing Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Mission To provide federal agencies in the United States and Canada with assurance
More informationProtect Yourself Against Security Challenges with Next-Generation Encryption
Protect Yourself Against Security Challenges with Next-Generation Encryption agrieco@cisco.com mcgrew@cisco.com How to detect attacks? Malware Broken encryption 2 How to detect attacks? Malware Host Process
More informationFIPS 140 & CC How do they get along
FIPS 140 & CC How do they get along Dawn Adams and Erin Connor EWA-Canada 22 September 2010 Overview Introduction FIPS 140 Overview Cryptography Under the CC CC SFRs in FIPS 140 The FCS Class FCS Logistics
More informationFIPS Non-Proprietary Security Policy
Pitney Bowes ibutton Postal Security Device (PSD) Hardware Version: MAXQ1959B-F50# Firmware Version: 9.01.00 Indicia Type: 0, 1, 2, 5, 7 and 8 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation
More informationImprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016
Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents
More information1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9
Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple
More informationFIPS Security Level 2 Policy LX-4000T Series Console Servers
FIPS 140-2 Security Level 2 Policy LX-4000T Series Console Servers MRV Communications Inc. 300 Apollo Dr. Chelmsford, MA. 01824 USA Document ID 445-RD-43 July 1, 2016 Version 1.16 1 Disclaimer MRV provides
More informationUNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE
INFORMATION TECHNOLOGY SECURITY GUIDANCE CRYPTOGRAPHIC ALGORITHMS FOR UNCLASSIFIED, PROTECTED A, AND PROTECTED B INFORMATION ITSP.40.111 August 2016 FOREWORD The Cryptographic Algorithms for UNCLASSIFIED,
More informationBarco ICMP FIPS Non-Proprietary Security Policy
Barco FIPS 140-2 Non-Proprietary Security Policy 1 Page 1 of 26 Table of Content Table of Content... 2 1 Introduction... 3 1.1 Security Level... 3 1.2 Cryptographic Boundary... 4 1.3 FIPS 140-2 Approved
More informationFireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450
FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared
More informationExpert 3.2
Giesecke & Devrient Sm@rtCafé Expert 3.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 1.6 December 2011 Copyright 2011 Giesecke & Devrient This document may be freely reproduced
More informationMeru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009
Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety
More informationID-One Cosmo V7-a Smart Card Cryptographic Module
ID-One Cosmo V7-a Smart Card Cryptographic Module FIPS 140-2 Security Policy Public Version Oberthur Technologies of America 4250 Pleasant Valley Road Chantilly, VA 20151-1221 - USA Document Number: SPV7-a.0-n
More informationOracle Linux 7 OpenSSH Server Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-2.0.0 Date: September 25, 2017 Document Version 1.2 Oracle
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationCambium PTP 600 Series Point to Point Wireless Ethernet Bridges FIPS Security Policy
POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium PTP 600 Series Point to Point Wireless Ethernet Bridges FIPS 140-2 Security Policy System Release 600-10-00-FIPS CONTENTS 1 Introduction... 5 1.1 Purpose...
More informationOracle Linux 6 OpenSSH Server Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 6 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R6-1.0.0 Date: September 28, 2017 Document Version 1.3 Oracle
More informationCambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy
POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS 140-2 Security Policy System Release 800-04-12-FIPS CONTENTS 1 Introduction... 5 1.1 Purpose... 5 1.2 Port
More informationEnhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy
Enhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy Document Number 1179470, Rev. 006 Prepared by: 6155 El Camino Real Carlsbad, CA 92009 Copyright 2015. May
More informationExpert 3.2
Giesecke & Devrient Sm@rtCafé Expert 3.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 1.5 June 2008 Copyright 2008 Giesecke & Devrient This document may be freely reproduced and
More informationSony Security Module. Security Policy
Sony Security Module Security Policy Document Version 1.0.0 Sony Corporation FIPS 140-2 Non-Proprietary Copyright 2010 Sony Corporation TABLE OF CONTENTS 1. MODULE OVERVIEW... 3 2. SECURITY LEVEL... 5
More informationWatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:
Watchdata Technologies Pte Ltd. 7F Qiming International Mansion, No.101, Wangjing Lize Middle Park, Chaoyang District, Beijing, P.R.China, 100102 Phone : (8610)6472 2288 (8610)8047 8166 Email : marketing@watchdata.com
More informationDolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4
Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200
More informationSecurity Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version
Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000 Version 02.00.07 3/22/2004 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 Astro Subscriber
More informationCOLLECTION, STORAGE, PROCESSING AND
COLLECTION, STORAGE, PROCESSING AND MOVEMENT OF AIRCRAFT DATA USING A VALIDATED AND SECURED MEANS CURTIS RIHN LARS ROSENBLADE MARK THOMPSON TABLE OF CONTENTS Abstract 1 Introduction 2 Aircraft Design Considerations
More informationFIPS Security Policy
Version 1.8 Last Update: 09/4/2014 1 WideBand Corporation 401 West Grand Street, Gallatin, MO 64640, USA 1 The actual module is a single chip within the depicted package WideBand Corporation, 2014 and
More informationSecurity Policy N30i/N30ig - 135/136 Meter
Recherche & Développement SPEC 272 / T 113, rue Jean Marin Naudin 92220 BAGNEUX France 33 (0)1 45 36 30 00 33 (0)1 45 36 30 10 Security Policy N30i/N30ig - 135/136 Meter V.VAISSIERE / F. TORCHE SUIVI DES
More informationFIPS Cryptographic Module Security Policy Entrust Authority Security Toolkit for the Java Platform
Title: Product: Date: Revision: FIPS 140-2 Cryptographic Module Security Policy ntrust Authority Security Toolkit for the Java Platform November 19, 2012 1.4 Copyright 2012 ntrust. All rights reserved.
More informationHewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0
Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationFIPS Level 3. Security Policy of Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0f. August Version 2.
FIPS 140-2 Level 3 Security Policy of Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0f August 2015 Version 2.3 Copyright 2014, Oracle and/or its affiliates. All rights reserved
More informationSecurity Policy Document Version 3.3. Tropos Networks
Tropos Control Element Management System Security Policy Document Version 3.3 Tropos Networks October 1 st, 2009 Copyright 2009 Tropos Networks. This document may be freely reproduced whole and intact
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 7 February 2018 383-4-434 V1.0 Government of Canada. This document
More informationExpert Embedded Security
Giesecke & Devrient Sm@rtCafé Expert Embedded Security FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation Version 0.7 August 2007 Copyright 2007 Giesecke & Devrient This document may be freely
More information