Pulse Secure, LLC. January 9, 2015
|
|
|
- Rosa Parks
- 9 years ago
- Views:
Transcription
1 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, by Pulse Secure, LLC. All rights reserved. May be reproduced only in its original entirety [without revision].
2 TABLE OF CONTENTS 1. MODULE OVERVIEW SECURITY LEVEL MODES OF OPERATION PORTS AND INTERFACES IDENTIFICATION AND AUTHENTICATION POLICY ACCESS CONTROL POLICY CRYPTOGRAPHIC KEY MANAGEMENT OPERATIONAL ENVIRONMENT SECURITY RULES PHYSICAL SECURITY MITIGATION OF OTHER ATTACKS POLICY DEFINITIONS AND ACRONYMS
3 1. Module Overview The Pulse Secure Network Connect Cryptographic Module (SW Version 2.0) is a software module that implements a set of cryptographic algorithms for use by a software application. This Security Policy document details the Pulse Secure Network Connect Cryptographic Module. The Pulse Secure Network Connect Cryptographic Module (PSNCCM) comprises a dynamic link library, odfips2.dll, compiled from source code written using a combination of C, C++ and assembly language implementations on specific platforms. The binary library resides in user space only. The PSNCCM runs on PCs under Windows XP (SP 2) and Windows 2000 (SP 3) operating systems. The module has a multi-chip standalone embodiment as defined by FIPS The module only implements an Approved mode of operation. The module was operational tested on the following Common Criteria evaluated platforms: Dell Optiplex GX400 running Windows 2000 Professional (SP 3) CC EAL 4 CCEVS Validation Report available at: Dell Optiplex GX270 running Windows XP Professional (SP 2) CC EAL 4 CCEVS Validation Report available at: keyboard mouse display controller controller controller System Bus cpu memory disk network ports physical boundary Figure 1: Hardware Diagram Showing PC Containing Cryptographic Module 3
4 2. Security Level Figure 2: Software Diagram Showing Cryptographic Boundary The Pulse Secure Network Connect Cryptographic Module meets the overall requirements applicable to Level 2 security of FIPS Table 1 - Module Security Level Specification Security Requirements Section Level Cryptographic Module Specification 2 Module Ports and Interfaces 2 Roles, Services and Authentication 2 Finite State Model 2 Physical Security N/A Operational Environment 2 Cryptographic Key Management 2 EMI/EMC 2 Self-Tests 2 Design Assurance 2 Mitigation of Other Attacks N/A 4
5 3. Modes of Operation Approved mode of operation In FIPS mode, the PSNCCM supports the following FIPS Approved algorithms: AES 128, 192, 256 ECB, CBC, and Counter modes (See certificate #783) AES-CCM Key sizes 128, 192, and 256 (See certificate #784) Triple-DES TECB and TCBC modes (See certificate #679) SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 (See certificate #787) HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA- 512 (See certificate #430) DSA Sign/Verify, Key Gen, and PQG Gen/Verify (See certificate #293) RSA Sign/Verify (See certificate #373) FIPS RNG (See certificate #451) The module only supports an Approved mode of operation. Once loaded into memory and executed, the module is running in FIPS mode. An operator of the module can verify that the module is running in the FIPS Approved mode of operation by first executing the EnableFIPSModule command, followed by the Get State service, which shall return the following: OD_FIPS_STATE_ENABLED. The cryptographic module provides the following allowed cryptographic algorithms: RSA Encrypt/Decrypt (for Key Transport only) (key wrapping; key establishment methodology provides between 80 and 128 bits of encryption strength) The following non-approved algorithm is also available in the Approved mode of operation: RSA Encrypt/Decrypt (for bulk data) - No security is claimed for data that has been encrypted using this RSA. 4. Ports and Interfaces All FIPS ports and interfaces are defined as the API of the cryptographic module. The API contains all data input, data output, control input, and status output interfaces to and from the module. 5
6 5. Identification and Authentication Policy Assumption of roles The PSNCCM shall support two roles, User and Cryptographic Officer. The authentication mechanism is provided by the host Operating System. Proper operation of the module requires that the host Operating System be configured to enforce a password length of at least six characters. The module relies on the Operating System to distinguish between an operator assuming the User role or Crypto Officer role. An operator with Administrator privileges to the Operating System assumes the Crypto Officer role. Table 2 lists these roles along with their required identification and authentication techniques. Table 3 outlines each authentication mechanism and the associated strengths. Table 2 - Roles and Required Identification and Authentication Role Type of Authentication Authentication Data User Role-based operator authentication Password Cryptographic Officer Role-based operator authentication Password Table 3 Strengths of Authentication Mechanisms Authentication Mechanism Strength of Mechanism Password Each password is at least six characters in length. Characters are chosen from a fifty-two character set. The probability of a successful random attempt is less than 1/52^6, which is less than 1/1,000,000. Assuming that no password lockout settings were configured, that no delay is configured between password attempts, and that an attacker could attempt 100 password entries per minute, the probability of successfully authenticating to the module within one minute through random attempts is 100/(52^6), which is less than one in 100,000. 6
7 6. Access Control Policy Roles and Services Table 4 lists each role and the services authorized for each role. Role User and Cryptographic Officer: Table 4 Services Authorized for Roles Authorized Services AES Encrypt/Decrypt TDES Encrypt/Decrypt RSA Sign/Verify DSA Sign/Verify Generate Random Number AES CCM HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 RSA Encrypt/Decrypt (for key transport only) - Note: This service is also used for encrypting/decrypting bulk data. However, no security is claimed for data that has been protected by RSA. RSA Key Generation DSA Key Generation AES Key Encryption Generate Prime Number Generates a prime number using the FIPS RNG Modular Exponentiation EnableFIPSModule Enables all authorized services. DisableFIPSModule Disables all authorized services and returns the module to a pre-operational state. GetState Returns the current state of the cryptographic module GetError Returns a specific error code when the module is in an error state Run Self-tests This service executes the suite of power up self-tests required by FIPS by calling the API command. Note: In addition to the authenticated "Run Self-Tests" service, self-tests can also be initiated by any operator without authentication by reloading the module into memory. 7
8 Definition of Critical Security Parameters (CSPs) The Critical Security Parameters (CSPs) defined for the PSNCCM consist of cryptographic keys and random numbers used as seeding material. The module does not persistently store CSPs within the logical boundary, and no CSPs are output from the physical bounds of the GPC. The following secret keys, private keys, and CSPs are supported by the module: AES Keys: 128, 192 and 256 bit keys used to AES encrypt/decrypt data. TDES Keys: 3 separate 128 bit DES keys used to TDES encrypt/decrypt data. AES CCM Key: 128, 192, or 256 bit AES Key used for AES CCM operations. HMAC Keys: For use during HMAC operations. DSA Signing Private Key: Used to digitally sign data. RSA Private Key: Used to digitally sign data. AES Key Encryption Key: 128 bit AES key for use in AES key wrapping operations. FIPS PRNG Seed and Seed Key: Used for the generation of CSPs and Keys. These values are entered into the module (not internally generated) and the strength of the keys generated depends on the strength of these parameters. HMAC Integrity Key: HMAC-SHA-512 key used during the Software Integrity Test. (Note: This key is only used for power up self-tests and is not considered a CSP per CMVP IG 7.4.) Definition of Public Keys: The following are the public keys contained in the module: RSA Verifying Public Key: This is the public part of the cryptographic module s RSA Public/Private key pair used to verify RSA signatures. DSA Public Key: This is the public part of the cryptographic module s DSA Public/Private key pair used to verify DSA signatures. RSA Wrapping Key: Used to perform RSA key transport of keys. Definition of CSPs Modes of Access Table 5 defines the relationship between access to CSPs and the different module services. The modes of access shown in the table are defined as follows: Read Write Execute Each service's API indicates the type of access to CSPs defined by that API. When a CSP is used by the API call to perform particular services, read and execute access is indicated. When a CSP is generated, modified or deleted by the API call, write access is indicated. 8
9 Table 5 Key and CSP Access Rights within Services Approved Services Keys/CSPs Authorized Roles Symmetric Encryption/Decryption Services Type of Access AES Encrypt/Decrypt AES Key User/CO read, execute TDES Encrypt/Decrypt TDES Key User/CO read, execute Asymmetric Encryption/Decryption for Key Wrapping Services RSA Encrypt RSA Wrapping Public Key User/CO read, execute RSA Decrypt RSA Private Key User/CO read, execute Message Authentication Services AES-CCM AES-CCM Key User/CO read, execute HMAC-SHA-1, HMAC- SHA-224, HMAC-SHA- 256, HMAC-SHA-384, HMAC-SHA-512 Digital Signature Generation/Verification Services HMAC Key User/CO read, execute RSA Verify RSA Verifying Public Key User/CO read, execute RSA Sign RSA Private Key User/CO read, execute DSA Verify DSA Public Key User/CO read, execute DSA Sign DSA Signing Private Key User/CO read, execute Symmetric Key Wrapping Service AES Key Encryption AES Key Encryption Key User/CO read, execute Symmetric Key Generation Service Generate Random Number Asymmetric Key Generation Services RSA Key Generation DSA Key Generation Other Services Generate Prime Number FIPS PRNG Seed and Seed Key RSA Public/Private Key Pair DSA Public/Private Key Pair FIPS PRNG Seed and Seed Key User/CO User/CO User/CO User/CO read, execute write write Modular Exponentiation N/A User/CO N/A EnableFIPSModule N/A User/CO N/A read, execute 9
10 Approved Services Keys/CSPs Authorized Roles Type of Access DisableFIPSModule N/A User/CO N/A Run Self-Tests N/A User/CO N/A GetState N/A User/CO N/A GetError N/A User/CO N/A 7. Cryptographic Key Management Key Generation The cryptographic module supports generation of DSA and RSA public and private keys, using the Approved FIPS deterministic random number generator. Key Storage The module does not persistently store keys. Key material is provided for use through a defined API, stored in RAM, and then destroyed once processing is terminated. If the operator wishes to store keys they are responsible for doing so outside of the cryptographic module's logical boundary. Zeroization All key data exists in data structures allocated within the cryptographic module, and can only be returned to an authorized user using the defined API. The operating system protects system memory and process space from access by unauthorized users. The operator of the cryptographic module should follow the steps outlined in the module s API specification to ensure sensitive data is protected by zeroizing the data from memory when it is no longer needed. 8. Operational Environment The FIPS Area 6 Operational Environment requirements are applicable because the module operates in a modifiable operational environment. The module was operational tested on the following Common Criteria evaluated platforms: Dell Optiplex GX400 running Windows 2000 Professional (SP 3) Dell Optiplex GX270 running Windows XP Professional (SP 2) 10
11 9. Security Rules The Pulse Secure Network Connect Cryptographic Module s design corresponds to the module s security rules. This section documents the security rules enforced by the cryptographic module to implement the security requirements of this FIPS Level 2 module. 1. The Operating System must enforce authentication methods to prevent unauthorized access to the module. The passwords to authenticate to the Operating System must be at least six characters long (chosen from a 52 character set). 2. The cryptographic module shall perform the following tests: A. Power up Self-Tests: 1. Cryptographic algorithm tests: a. AES KAT b. AES CCM KAT c. TDES KAT d. RSA Sign/Verify KAT e. RSA Encrypt/Decrypt KAT (for key transport only) f. DSA Sign/Verify KAT g. HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 KATs h. SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 KATs i. FIPS DRNG KAT 2. Software Integrity Test (HMAC-SHA-512) B. Conditional Self-Tests: 1. Continuous Random Number Generator (RNG) test performed on DRNG 2. DSA pairwise consistency test 3. RSA pairwise consistency test 3. The operator shall be capable of commanding the module to perform the power-up self-test by reloading the module into memory or by calling the odfips_runselftestasynch function. 4. Prior to each use, the internal RNG shall be tested using the conditional test specified in FIPS Data output shall be inhibited during key generation, self-tests, zeroization, and error states. 6. Status information shall not contain CSPs or sensitive data that if misused could lead to a compromise of the module. 7. The module does not support concurrent operators. 11
12 10. Physical Security The FIPS Area 5 Physical Security requirements are not applicable because the device is a software only module. 11. Mitigation of Other Attacks Policy The module has not been designed to mitigate any specific attacks outside the scope of FIPS requirements. 12. Definitions and Acronyms AES API CC CCEVS CO CSP DLL DRNG DSA EAL EMC EMI FIPS GPC HMAC PNCCM RAM RNG RSA TDES SHA Advanced Encryption Standard Application Program Interface Common Criteria Common Criteria Evaluation and Validation Scheme Cryptographic Officer Critical Security Parameter Dynamic Link Library Deterministic Random Number Generator Digital Signature Algorithm Evaluation Assurance Level Electromagnetic Compatibility Electromagnetic Interference Federal Information Processing Standard General Purpose Computer Keyed-Hash Message Authentication Code Pulse Secure Network Connect Cryptographic Module Random Access Memory Random Number Generator Rivest, Shamir and Adleman Algorithm Triple-DES Secure Hash Algorithm 12
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Symantec Mobility: Suite Server Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Symantec Mobility: Suite Server Cryptographic Module Software Version 1.0 Document Version 1.4 February 10, 2016 Prepared For: Prepared By: Symantec Corporation
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N : 1.0
SNAPcell Security Policy Document Version 1.7. Snapshield
SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
FIPS 140-2 Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module
FIPS 140-2 Security Policy for Motorola, Inc Motorola Wireless Fusion on Windows CE Cryptographic Module Hybrid Module Software Component Version: 3.00.0 Hardware Component Version: CX 55222 Document Version
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version 3.0.0.1, 3.0.0.2 October 22, 2012
RSA BSAFE Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy Version 3.0.0.1, 3.0.0.2 October 22, 2012 Strong encryption technology for C/C++ developers Contact Information See our Web sites
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America
VMware, Inc. VMware Kernel Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared by: VMware, Inc. 3401
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,
OpenSSL FIPS 140-2 Security Policy Version 1.2.4
OpenSSL FIPS Object Module Version 1.2.4 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.2.4 June 12, 2012 Copyright Notice Copyright 2003-2012
1C - FIPS 140-2 Cisco VPN Client Security Policy
This document describes the Cisco VPN Client security policy. Introduction This non-proprietary cryptographic module security policy describes how version 3.6.5 of the Cisco software VPN Client meets the
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of
Network Security Services (NSS) Cryptographic Module Version 3.12.4
Network Security Services () Cryptographic Module Version 3.12.4 FIPS 140-2 Security Policy Level 1 Validation Wind River Systems, Inc. Version 1.2 Last Update: 2010-12-13 Table of Contents 1 Introduction...
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy
NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy FIPS 140-2 Level 2 Validation Model Numbers NS-IPS-620R-4C-B NS-IPS-1220R-6C-B NS-IPS-1220R-4C-2F-B NS-IPS-620R-4C-BFS
FIPS 140-2 SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes
FIPS 140-2 Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library for Secure Work Space Version 1.0 Document Version 1.2 BlackBerry Security Certifications, Research In Motion 2013 BlackBerry Limited. All rights
Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS 140-2 Non-Proprietary Security Policy
Cisco Systems Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation Document Version 1.0 2011 CISCO
FIPS 140-2 Security Policy
Red Hat Enterprise Linux 6.2 dm-crypt Cryptographic Module v2.0 Version 1.4 Last Update: 2013-04-03 Contents 1 Cryptographic Module Specification...3 1.1 Description of Module...3 1.2 Description of Modes
FIPS 140-2 Documentation: Security Policy 05/06/2015 11:21 AM. Windows CE and Windows Mobile Operating System. Abstract
Windows CE and Windows Mobile Operating System Microsoft Windows CE, Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) (5.00.911762, 5.01.01603, 5.04.17228, 5.05.19202,
FIPS 140-2 Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.9
Bomgar Corporation B200 and B300 Remote Support Appliances Firmware Version: 3.2.2FIPS; Software Version: 10.6.2FIPS; Hardware Versions: B200, B300, and B300 r1 FIPS 140-2 Non-Proprietary Security Policy
Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor
ISIONS DESCRIPTION ECO DATE APPROVED F Initial Release 2108109 06/02/10 Lee Armstrong Copyright 2010 by Texas Instruments.. Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor The data in this
HP LTO-6 Tape Drive Level 1 Security Policy
HP LTO-6 Tape Drive Level 1 Security Policy Version: 8 Revision Date: 1 October 2013 Hewlett Packard Company Copyright 2013 Hewlett-Packard Company This document may be freely reproduced and distributed
SafeEnterprise TM ATM Encryptor II Model 600 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy
SafeEnterprise TM ATM Encryptor II Model 600 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Hardware Models T1 RJ45 (901-11001-00x) E1 BNC (901-27001-00x) T3 BNC (901-37001-00x) E3 BNC (901-77001-00x)
Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v7.0.1.01)
Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v7.0.1.01) FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation Document Version 1.1 Prepared
MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002
Security Policy MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR ENCRYPTION SERVICES MODULE REV 1.2, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 1 Terms and Definitions... 2 Security Level...
Security Policy: Key Management Facility Crypto Card (KMF CC)
Security Policy: Key Management Facility Crypto Card (KMF CC) Version 2.12.2 2/7/11 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 KMF CC Implementation 4 1.4 KMF CC HW/SW version numbers 4 1.5 KMF
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System
HEWLETT PACKAD TIPPINGPOINT FIPS 140 2 NON POPIETAY SECUITY POLICY HP TippingPoint Security Management System Level 1 Validation Firmware Version: 3.2.0.8312.3 Document Version: 1.03 Page 1 of 31 FIPS
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following
OpenSSL FIPS 140-2 Security Policy Version 1.2.3
OpenSSL FIPS Object Module Version 1.2.3 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.2.3 May 3, 2011 Copyright Notice Copyright 2003,
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) (Windows Server 2003 SP2) FIPS 140-2 Documentation: Security Policy July 02, 2008 Abstract This document specifies the non-proprietary security
Non-Proprietary Security Policy for the FIPS 140-2 Level 1 Validated Fortress Secure Client Software Version 3.1
Non-Proprietary Security Policy for the FIPS 140-2 Level 1 Validated Fortress Secure Client Software Version 3.1 (Document Version 1.01) June 2007 Prepared by the Fortress Technologies, Inc., Government
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) (Windows Server 2003 SP2) FIPS 140-2 Documentation: Security Policy September 20, 2007 Abstract This document specifies the non-proprietary
OpenSSL FIPS 140-2 Security Policy Version 1.1.1b
OpenSSL FIPS Object Module Version 1.1.1 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.1.1b January 29, 2007 Copyright Notice Copyright
FIPS 140-2 SECURITY POLICY
FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 320M and SSG 350M HW P/N SSG-320M and SSG-350M, FW Version ScreenOS 6.2.0 Document # 530-023730-01 Copyright Notice Copyright 2009 Juniper Networks,
Microsoft Windows Server 2008 R2 Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy Document
Microsoft Windows Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy Document Microsoft Windows Server 2008 R2 Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy
FIPS 140-2 SECURITY POLICY
FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 140 HW P/N SSG-140-SB, SSG-140-SH, FW Version ScreenOS 6.3.0r6 Copyright Notice Copyright 2012 Juniper Networks, Inc. May be reproduced only in its
OpenSSL FIPS 140 2 Security Policy Version 1.2.2
OpenSSL FIPS Object Module Version 1.2.2 By the Open Source Software Institute http://www.oss institute.org/ OpenSSL FIPS 140 2 Security Policy Version 1.2.2 November 5, 2010 Copyright Notice Copyright
TANDBERG MXP Codec (Firmware Version: F6.0) FIPS 140-2 Non-Proprietary Security Policy
TANDBERG Telecom AS TANDBERG MXP Codec (Firmware Version: F6.0) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 1.3 Prepared for: Prepared by: TANDBERG Telecom AS Corsec
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
FIPS 140-2 Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 1.9. 1201 Winterson Road Linthicum, MD 21090
Ciena Corporation 565/5100/5200 Advanced Services Platform FW Version: 11.2 and 11.21 HW Versions: 565 Chassis (NT0H50DAE5 REV 004), Backplane SP Card (NT0H5066E5 Rev 04), QOTR/E Card (NT0H25BAE5 Rev 2),
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
FIPS 140-2 Security Policy for WatchGuard XTM
FIPS 140-2 Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525 XTM 1520-RP, XTM 1525-RP XTM 2520 Version: 2.9 November 5, 2014 FIPS 140-2 Security Policy for WatchGuard
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2
NIST Special Publication 800-29 A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2 Ray Snouffer Annabelle Lee Arch Oldehoeft Security Technology Group Computer
Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy
Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Overall Level 2 Validation Version 0.54 April 25, 2012 Introduction... 3 References... 3 FIPS 140-2 Submission
How To Protect Your Computer From Attack
FIPS PUB 140-2 CHANGE NOTICES (12-03-2002) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11) SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES CATEGORY: COMPUTER
7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE,
FIPS 140-2 Non-Proprietary Security Policy for the Cisco Unified IP Phone 7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, and 7975G Introduction This is a non-proprietary
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators
Freescale Semiconductor White Paper Document Number: FSLNISTCAVP Rev. 1.7, 03/2015 NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators This document
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8. FIPS 140-2 Non-Proprietary Security Policy
Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared
Microsoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: April 25, 2012 Athena Smartcard Inc. Public Material may be reproduced only
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls Security Policy
PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls Security Policy Version: N Palo Alto Networks Revision Date: 11/19/15 www.paloaltonetworks.com 2015
HP Networking Switches
HP Networking Switches FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation Version 1.02 April 2013 Copyright Hewlett-Packard Company 2012, May be reproduced only in its original entirety [without
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Sonus Networks, Inc. SBC 5110 and 5210 Session Border Controllers Hardware Version: SBC 5110 and SBC 5210 Firmware Version: 4.0
Sonus Networks, Inc. SBC 5110 and 5210 Session Border Controllers Hardware Version: SBC 5110 and SBC 5210 Firmware Version: 4.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document
NXP & Security Innovation Encryption for ARM MCUs
NXP & Security Innovation Encryption for ARM MCUs Presenters Gene Carter- International Product Manager, NXP Semiconductors Gene is responsible for marketing of the ARM7 and Cortex-M3 microcontrollers.
Security Builder. Certicom Corp. Security Builder Government Solutions Edition. Windows. FIPS 140-2 Non-Proprietary Security Policy.
Security Builder Certicom Corp. Security Builder Government Solutions Edition Windows FIPS 140-2 Non-Proprietary Security Policy May 28, 2002 Copyright 2002 Certicom Corp. This document may be freely reproduced
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved
11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish
Protection Profile for Email Clients
Protection Profile for Email Clients 1 April 2014 Version 1.0 Page 1 of 69 1 Introduction... 4 1.1 Overview of the TOE... 4 1.2 Usage of the TOE... 4 2 SECURITY PROBLEM DESCRIPTION... 6 2.1 Threats...
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
Payment Card Industry (PCI) Hardware Security Module (HSM) Security Requirements Version 1.0
Payment Card Industry (PCI) Hardware Security Module (HSM) Security Requirements Version 1.0 April 2009 Document Changes Date Version Author Description September 2003 0.5 InfoGard Initial Draft October
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
FIPS 140-2 Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.7
Blue Coat Systems, Inc. ProxySG 9000 Series Models: SG9000-20, SG9000-20B, SG9000-30, SG9000-40 Hardware Version: 090-02840, 090-02839, 090-02984, 090-02985, 090-02841, 090-02842, 090-02845, 090-02846
