Secure Network Communications FIPS Non Proprietary Security Policy
|
|
|
- Victor Anderson
- 9 years ago
- Views:
Transcription
1 Secure Network Communications FIPS Non Proprietary Security Policy 21 June 2010
2 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles and Services Authentication Authorized Services Finite State Model Operational Environment Rules of Operation Software Security Critical Security Parameters Self Tests Power up Tests Conditional Tests Pair wise Consistency Test Software/Firmware Load Test Manual Key Entry Test Bypass Test Critical Function Tests Design Assurance Application Management of Critical Security Parameters Identifying CSPs Storage of CSPs Destruction of CSPs Appendix A Finite State Model State Descriptions 2/15
3 Introduction The AccessData Secure Network Communications FIPS Module is a cryptographic module that operates as a multi chip component library positioned between the OpenSSL API and a host application as illustrated in Figure 1. The Module provides to any AccessData application that utilizes it, electronic encryption designed to prevent unauthorized access to data transferred across a physical or wireless TCP/IP network. Instances of the Module operating concurrently on two general purpose computers encrypt data placed on, and decrypt data read from, the network; protecting the user of the application on the hardware platform. Figure 1 Conceptual diagram of the AccessData Secure Network Communications Module This document is the non proprietary FIPS security policy for the AccessData Secure Network Communications software module to meet FIPS level 1 requirements. This Security Policy details the secure operation of the AccessData Secure Network Communications FIPS Module as required in Federal Information Processing Standards Publication (FIPS 140 2) as published by the National Institute of Standards and Technology (NIST) of the United States Department of Commerce. Module Specification For the purposes of FIPS validation the AccessData Secure Network Communications FIPS Module v1.0 is defined as a dynamically linked library (DLL). The term Module elsewhere in this document refers to this AccessData Secure Network Communications FIPS Module. The Module provides an API for invocation of FIPS approved cryptographic functions from calling applications. The Module is designed for use in AccessData applications that will be transmitting information over a general purpose network securely. 3/15
4 The Module was tested by the FIPS and Security Testing (CST) laboratory for the specific platform identified in Table 1. The Module provides confidentiality, integrity, and message digest services. It natively supports the following algorithms: AES, RSA (for digital signatures and key wrapping), SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, and HMAC SHA 1, HMAC SHA 224, HMAC SHA 256, HMAC 384, HMAC SHA 512, ANSI X9.31 compliant deterministic random number generation. Platform Microsoft Windows XP SP3 Module File Name FipsComm.dll Table 1 FIPS Module by Platform Ports and Interfaces For the purposes of this FIPS validation, the Module is considered a multi chip standalone module. Although the Module is software the physical embodiment is a general purpose computer that consists of multiple components, considered to be a multi chip standalone module by FIPS The logical cryptographic boundary for the Module is the dynamically linked library, FipsComm.dll. The physical cryptographic boundary contains the general purpose computing hardware of the system executing the application. This system hardware includes the central processing unit(s), cache and main memory (RAM), system bus, and peripherals including disk drives and other permanent mass storage devices, network interface cards, and other internal system components. The Module provides a logical interface via an Application Programming Interface (API). This logical interface exposes services that applications may utilize directly or extend to add support for new data sources or protocols. The API provides functions that may be called by the referencing application. The API interface provided by the Module is mapped onto the FIPS logical interfaces: data input, data output, control input, and status output. Each of the FIPS logical interfaces relate to the Moduleʹs callable interface, as follows: Data Input: Data Output: Control Input: Status Output: Input parameters to all functions that accept input from Crypto or User entities Output parameters from all functions that return data as arguments or return values from Crypto or User entities All API function input into the module by the Crypto and User entities information returned via exceptions (return/exit codes) to Crypto or User entities 4/15
5 Approved Algorithms The Module supports the following FIPS approved cryptographic algorithms: Rivest Shamir Adleman (RSA) PKCS #1 digital signature Advanced Encryption Standard (AES FIPS 197) Secure Hashing Algorithm (SHA 1, SHA 2 FIPS 180 3) Keyed Hash Message Authentication Code (HMAC FIPS 198 1) The module also supports the following non approved algorithms that may be used in FIPS mode as part of the TLS protocol: HMAC MD5 MD5 Rivest Shamir Adleman (RSA) key wrapping; key establishment mechanism provides between 80 and 256 bits of encryption strength The Module performs ANSI X9.31 random number generation. Algorithm Type Asymmetric Keys Approved Algorithms Algorithm Standard FIPS Validation Certification Number RSA ALG[ANSIX9.31]; SIG(gen); SIG(ver); Usage 626 Sign and Verify Operations ALG[RSASSA PKCS1_V1_5]; SIG(gen); SIG(ver) Symmetric Key AES CBC, CFB8, CFB128, ECB, OFB each with 128, 192, or ALG[RSASSA PSS]; SIG(gen); SIG(ver); FIPS encrypt/decrypt operations 5/15
6 256 bit keys HMAC Hashing HMAC SHA 1 HMAC SHA 224 HMAC SHA 256 HMAC SHA 384 HMAC SHA 512 SHA 1 SHA 224 SHA 256 SHA 384 SHA 512 FIPS module integrity code integrity Message integrity FIPS hashing RNG ANSI X9.31 ANSI X Random number generation Table 2 Approved Algorithms Approved Mode of Operation The module only has an approved mode of operation. In order to initialize the module and make use of the APIs, it is first necessary to perform the initialization call FIPSVerify(). The module s APIs will return an error and perform no operations until this call is made and successfully returns. Calling the FIPSVerify() function invokes the module s power up self tests and returns the status indicator of the test results. Calling the function after the initialization returns the state of the internal flag, acting as a FIPS mode indicator. The DLL initialization is performed when the application invokes the FIPSVerify() call. Prior to using any Module functions FIPSVerify() must be called successfully. Execution of any function without having called FIPSVerify() first will fail as the DLL has not yet been initialized. The FIPSVerify() function relies upon a composite integrity test (composed of both its own HMAC SHA 1 test and the HMAC SHA 1 integrity test used by the embedded OpenSSL FIPS Object module) to prevent code corruption and also performs algorithm power up self tests (Pairwise Consistency and Known Answer tests) to prevent cryptographic algorithm corruption. If any power up self test fails, the internal global error flag FIPS_FAILED is set to prevent subsequent invocation of any cryptographic function calls. If all components of the power up self test are successful then FIPSVerify()sets the internal flag to TRUE. 6/15
7 Test Environment The Module was tested by the FIPS CST laboratory on Windows XP SP3. 7/15
8 Roles, Services and Authentication Roles and Services The User and Crypto roles are implicitly assumed by any entity that can access services implemented in the Module. In addition the Crypto role can install and initialize the Module; this role is implicitly entered when installing the Module or performing system administration functions on the host operating system: User Role Crypto Role All services except installation All services including installation The Module meets the FIPS level 1 requirements for Roles and Services for User and Crypto Roles. As a library and as allowed by FIPS the Module does not support user identification or authentication for those roles. Authentication The Module does not provide identification or authentication mechanisms that would distinguish between the two supported roles. These roles are implicitly assumed by the services that are accessed, and can be differentiated by assigning module installation and configuration services to the Crypto. Only a single user in a specific role may access Module services at the same time. Authorized Services The services provided by the Module are listed in the following table. All services may be performed in both User and Crypto Roles except for the Module installation service which may only be performed by in the Crypto role: Roles Services Ephemeral Critical Security Parameters User, Symmetric Encryption / Decryption Digital Signature Generation / Verification Symmetric Key Asymmetric Private Key Algorithm AES, Triple DES RSA Installation CSP Access Execute Execute 8/15
9 User, User, User, User, User, Module Initialization Power up Self Test Random Number Generation Key Establishment Table 3 Authorized Services RNG Seed and RNG Seed Key Asymmetric public and private keys X9.31 RNG Execute RSA Show Status Read, Write, Execute Finite State Model The Module implements the finite state machine detailed in Appendix A. Operational Environment Applications referencing the Module run as processes under the control of the host system operating system. Modern operating systems segregate running processes into virtual memory areas that are logically separated from all other processes by the operating system and CPU. The Module functions completely within the process space of the process which loads it. It does not communicate with any processes other than the one that loads it, and satisfies the FIPS requirement for a single user mode of operation. Rules of Operation 1. The Module API is accessible only after the DLL initialization using the FIPSVerify() function call. All APIs will return errors and perform no operations until this call is made. 2. The replacement or modification of the Module by unauthorized intruders is prohibited. 3. The Operating System enforces authentication method(s) to prevent unauthorized access to Module services. 4. The referencing application accessing the Module runs in a separate virtual address space with a separate copy of the executable code. 9/15
10 5. The unauthorized reading, writing, or modification of the address space of the Module is prohibited. 6. The writable memory areas of the Module (data and stack segments) are accessible only by a single application so that the Module is in ʺsingle userʺ mode, i.e. only the one application has access to that instance of the Module. 7. The operating system is responsible for multitasking operations so that other processes cannot access the address space of the process containing the Module. 8. Secret or private keys that are input to or output from an application must be input or output in encrypted form using a FIPS Approved algorithm. Note that keys exchanged between the application and the Module may not be encrypted. Software Security The module relies upon a composite integrity test using both its own HMAC SHA 1 test and the HMAC SHA 1 integrity test used by the embedded OpenSSL FIPS Object module. Both tests combine to ensure that the module s integrity has been maintained. This test is performed each time the module is initiated. Critical Security Parameters A Critical Security Parameter (CSP) is information, such as passwords, symmetric keys, asymmetric private keys, etc., that must be protected from unauthorized access. Since the Module is accessed via an API from a referencing application, the Module does not manage CSPs, except for the internal RNG seed and seed key used during random number generation. In fact, for most applications CSPs will be found in multiple locations external to the Module, such as in application buffers, primary (RAM) memory, secondary disk storage, CPU registers, and on the system bus. In the case of networked client server applications some CSPs will be found on both the client and server system and on the network infrastructure in between (Ethernet and WAN communication lines, routers, switches). The application designer and the end user share a responsibility to ensure that CSPs are always protected from unauthorized access. This protection will generally make use of the security features of the host hardware and software which is outside of the cryptographic boundary defined for this Module. All of these ephemeral keys, including the module managed RNG Seed and RNG Seed Key, can be procedurally zeroized by cycling the power of the general purpose computer system thereby erasing all keys from memory, since they are only stored in RAM. While not considered CSPs, the module does store the plaintext HMAC Integrity Keys within its cryptographic boundary. These keys are only used to perform the software integrity tests of the module, cannot be accessed by the operator, and are neither input nor output. 10/15
11 Self Tests The Module performs a number of power up and conditional self tests to ensure proper operation of the Module. Power up tests include cryptographic algorithm known answer tests and integrity tests. The integrity tests are performed using HMAC SHA 1 digests calculated over the module s executable code. Power up tests are run automatically when the Module is initialized. Additionally, software integrity tests may be executed at any time by calling the FIPSVerify()function and verifying it returns true. All self tests can be executed by unloading the module and re performing the initialization using the FIPSVerify() function. No cryptographic functionality will be available until after successful execution of all power up tests. No authentication is required to perform self tests either automatically or upon demand. The failure of any power up self test or continuous test causes the Module to enter the Self Test Failure state (see Appendix A), and all cryptographic operations are disabled until the Module is reinitialized with a successful FIPSVerify()call. Note the most likely cause of a self test failure is memory or hardware errors. In practice a self test failure means the application must exit and be restarted. Power up Tests Known Answer Tests (KATs) are tests where a cryptographic value is calculated and compared with a stored previously determined answer. The power up self tests for the following algorithms use a KAT: Algorithm AES RSA HMAC RNG Table 4 Power Up Test Algorithms Known Answer encryption and decryption with 128 bit key known answer test with 1024 bit key public encryption and private decryption with 1024 bit key; sign and verify test with 1024 bit key HMAC SHA 1 HMAC SHA 224 HMAC SHA 256 HMAC SHA 384 HMAC SHA 512 Generation of a known value using the ANSI X9.31 RNG Conditional Tests In addition to the power up tests, the Module performs several conditional tests including pair wise consistency tests on newly generated public and private key pairs. Conditional tests are performed automatically as necessary and cannot be turned off. Currently, all conditional tests relate to services available only to users. Thus, conditional and critical function tests are not performed at any time in response to Crypto actions. 11/15
12 Algorithm RSA RNG Table 5 Conditional Test Algorithms Conditional Test pairwise consistency test (public encryption and private decryption with the newly generated keypair) Continuous Random Number Generation Test implemented for the approved RNG Pair wise Consistency Test A pairwise consistency test is performed when RSA key pairs are generated by applying a private key to the ciphertext and verifying that the result equals the original plaintext. Software/Firmware Load Test Not applicable; the Module does not utilize externally loaded cryptographic modules. Manual Key Entry Test Not applicable; keys are not manually entered into the Module. Bypass Test Not applicable; the Module does not implement a bypass capability. Critical Function Tests The Module does not mitigate against any specific attacks. Design Assurance The Module is managed in accordance with the established configuration management and source version control procedures of the AccessData Secure Network Communications project. Application Management of Critical Security Parameters Identifying CSPs All CSPs must be created, stored, and destroyed in an approved manner as described by FIPS CSPs are those items of information which must be protected from disclosure, such as symmetric keys, asymmetric private keys, etc. Note that the application designer and end user/system administrator/crypto share a responsibility for protection of CSPs; the former to include appropriate technical protections and the latter to install and configure the application correctly. Technical protections include checks to require that files storing CSPs have appropriate permissions (not group writable or world readable, for example). Administrative protections include installation of the runtime software (executables and configuration files) in protected locations. End users have a responsibility to refrain from comprising CSPs (as by sending a password in clear text or copying an encryption key to an unprotected location). 12/15
13 Storage of CSPs The Module does not store any critical security parameters (CSPs) in persistent media; while the Module is initialized any CSPs reside temporarily in RAM and are destroyed at the end of the session. Any keys or other CSPs otherwise stored in persistent media must be protected in accordance with FIPS requirements in Reference 1, FIPS Destruction of CSPs All keys and CSPs within the cryptographic module are stored within the RAM of the general purpose computer system. The values are procedurally zeroized when the general purpose computer system is powered down causing the RAM to be erased. 13/15
14 Appendix A Finite State Model This Appendix describes the Finite State Machine (FSM) model for an application utilizing the AccessData Secure Network Communications FIPS Module. Figure A.1 is a finite state diagram showing the states and transitions between states. At any point in time the Module is in one and only one state. Various software or operating system driven events can cause a transition to another state. Diagram A.1 Finite State Machine Diagram State Descriptions 1. Power On State The application making use of the Module has not been loaded into memory by the host operating system. The Module transitions to the Power On State when the application is invoked as a process by the host operating system and thereby loads the module into memory. 2. Self Test State 14/15
15 The application has been loaded into memory for a process created by the host operating system, but the power up self tests and DLL initialization (FIPSVerify() call) have not yet been performed. The FIPSVerify() call will transition to either the Error or Operational state. Any of the following errors can occur during the power up self test, all cause a transition to the Error state: SUCCESS Returned when a function successfully completes RESEND Returned when the data must be resent to the peer CLOSED Returned when a connection has been properly closed FAILED Indicates a general failure to properly execute BUFFEROVERFLOW Returned when the data returned is larger than the target buffer FAILED_FIPS Returned on self test failure or incomplete DLL initialization MEMORY_ERROR Indicates a general memory allocation failure CERT_ERROR Returned when certificate file is not found or fails to load 3. Error State The initial power up self test or subsequent optional self test has failed. The application and Module will typically terminate on detection of the power up self test error. While not likely in practice, a successful re invocation of the power up self test could transition to the Operational state. 4. Operational State The power up self test has executed successfully. The cryptographic algorithms in the Module can now be accessed by the application. The Module will remain in the Operational state until the application is terminated and enters the Power Off state. 5. Crypto State The application is in crypto officer state. 6. User State The application is in user state. 7. Show Status State The application is performing a show status operation. 8. Key Management State The application is performing a key management operation. 9. Power Off State The host operating system has terminated the application process and released all memory. 15/15
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
OpenSSL FIPS 140-2 Security Policy Version 1.1.1b
OpenSSL FIPS Object Module Version 1.1.1 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.1.1b January 29, 2007 Copyright Notice Copyright
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
FIPS 140-2 Documentation: Security Policy 05/06/2015 11:21 AM. Windows CE and Windows Mobile Operating System. Abstract
Windows CE and Windows Mobile Operating System Microsoft Windows CE, Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) (5.00.911762, 5.01.01603, 5.04.17228, 5.05.19202,
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N : 1.0
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
OpenSSL FIPS 140-2 Security Policy Version 1.2.4
OpenSSL FIPS Object Module Version 1.2.4 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.2.4 June 12, 2012 Copyright Notice Copyright 2003-2012
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,
FIPS 140-2 Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module
FIPS 140-2 Security Policy for Motorola, Inc Motorola Wireless Fusion on Windows CE Cryptographic Module Hybrid Module Software Component Version: 3.00.0 Hardware Component Version: CX 55222 Document Version
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4
RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version 3.0.0.1, 3.0.0.2 October 22, 2012
RSA BSAFE Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy Version 3.0.0.1, 3.0.0.2 October 22, 2012 Strong encryption technology for C/C++ developers Contact Information See our Web sites
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Symantec Mobility: Suite Server Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Symantec Mobility: Suite Server Cryptographic Module Software Version 1.0 Document Version 1.4 February 10, 2016 Prepared For: Prepared By: Symantec Corporation
Network Security Services (NSS) Cryptographic Module Version 3.12.4
Network Security Services () Cryptographic Module Version 3.12.4 FIPS 140-2 Security Policy Level 1 Validation Wind River Systems, Inc. Version 1.2 Last Update: 2010-12-13 Table of Contents 1 Introduction...
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
Security Policy: Key Management Facility Crypto Card (KMF CC)
Security Policy: Key Management Facility Crypto Card (KMF CC) Version 2.12.2 2/7/11 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 KMF CC Implementation 4 1.4 KMF CC HW/SW version numbers 4 1.5 KMF
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
SafeEnterprise TM ATM Encryptor II Model 600 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy
SafeEnterprise TM ATM Encryptor II Model 600 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Hardware Models T1 RJ45 (901-11001-00x) E1 BNC (901-27001-00x) T3 BNC (901-37001-00x) E3 BNC (901-77001-00x)
HP LTO-6 Tape Drive Level 1 Security Policy
HP LTO-6 Tape Drive Level 1 Security Policy Version: 8 Revision Date: 1 October 2013 Hewlett Packard Company Copyright 2013 Hewlett-Packard Company This document may be freely reproduced and distributed
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
FIPS 140-2 SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
SNAPcell Security Policy Document Version 1.7. Snapshield
SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3
MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002
Security Policy MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR ENCRYPTION SERVICES MODULE REV 1.2, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 1 Terms and Definitions... 2 Security Level...
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) (Windows Server 2003 SP2) FIPS 140-2 Documentation: Security Policy July 02, 2008 Abstract This document specifies the non-proprietary security
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)
Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) (Windows Server 2003 SP2) FIPS 140-2 Documentation: Security Policy September 20, 2007 Abstract This document specifies the non-proprietary
FIPS 140-2 Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.9
Bomgar Corporation B200 and B300 Remote Support Appliances Firmware Version: 3.2.2FIPS; Software Version: 10.6.2FIPS; Hardware Versions: B200, B300, and B300 r1 FIPS 140-2 Non-Proprietary Security Policy
13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA 22033 United States of America
VMware, Inc. VMware Kernel Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared by: VMware, Inc. 3401
NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy
NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy FIPS 140-2 Level 2 Validation Model Numbers NS-IPS-620R-4C-B NS-IPS-1220R-6C-B NS-IPS-1220R-4C-2F-B NS-IPS-620R-4C-BFS
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
OpenSSL FIPS 140-2 Security Policy Version 1.2.3
OpenSSL FIPS Object Module Version 1.2.3 By the Open Source Software Institute http://www.oss-institute.org/ OpenSSL FIPS 140-2 Security Policy Version 1.2.3 May 3, 2011 Copyright Notice Copyright 2003,
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
1C - FIPS 140-2 Cisco VPN Client Security Policy
This document describes the Cisco VPN Client security policy. Introduction This non-proprietary cryptographic module security policy describes how version 3.6.5 of the Cisco software VPN Client meets the
OpenSSL FIPS 140 2 Security Policy Version 1.2.2
OpenSSL FIPS Object Module Version 1.2.2 By the Open Source Software Institute http://www.oss institute.org/ OpenSSL FIPS 140 2 Security Policy Version 1.2.2 November 5, 2010 Copyright Notice Copyright
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2
NIST Special Publication 800-29 A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2 Ray Snouffer Annabelle Lee Arch Oldehoeft Security Technology Group Computer
An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature
Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor
ISIONS DESCRIPTION ECO DATE APPROVED F Initial Release 2108109 06/02/10 Lee Armstrong Copyright 2010 by Texas Instruments.. Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor The data in this
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
FIPS 140-2 Security Policy
Red Hat Enterprise Linux 6.2 dm-crypt Cryptographic Module v2.0 Version 1.4 Last Update: 2013-04-03 Contents 1 Cryptographic Module Specification...3 1.1 Description of Module...3 1.2 Description of Modes
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
FIPS 140-2 Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library for Secure Work Space Version 1.0 Document Version 1.2 BlackBerry Security Certifications, Research In Motion 2013 BlackBerry Limited. All rights
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS 140-2 Non-Proprietary Security Policy
Cisco Systems Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation Document Version 1.0 2011 CISCO
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
FIPS 140-2 Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 1.9. 1201 Winterson Road Linthicum, MD 21090
Ciena Corporation 565/5100/5200 Advanced Services Platform FW Version: 11.2 and 11.21 HW Versions: 565 Chassis (NT0H50DAE5 REV 004), Backplane SP Card (NT0H5066E5 Rev 04), QOTR/E Card (NT0H25BAE5 Rev 2),
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v7.0.1.01)
Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v7.0.1.01) FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation Document Version 1.1 Prepared
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System
HEWLETT PACKAD TIPPINGPOINT FIPS 140 2 NON POPIETAY SECUITY POLICY HP TippingPoint Security Management System Level 1 Validation Firmware Version: 3.2.0.8312.3 Document Version: 1.03 Page 1 of 31 FIPS
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators
Freescale Semiconductor White Paper Document Number: FSLNISTCAVP Rev. 1.7, 03/2015 NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators This document
Microsoft Windows Server 2008 R2 Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy Document
Microsoft Windows Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy Document Microsoft Windows Server 2008 R2 Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy
BlackBerry Enterprise Solution Security Release 4.1.2 Technical Overview www.vodafone.com.mt
BlackBerry Enterprise Solution Security Release 4.1.2 Technical Overview www.vodafone.com.mt Life is now BlackBerry Enterprise Solution Security 1 Contents 5 Wireless security 5 BlackBerry Enterprise Solution
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
How To Protect Your Computer From Attack
FIPS PUB 140-2 CHANGE NOTICES (12-03-2002) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11) SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES CATEGORY: COMPUTER
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8. FIPS 140-2 Non-Proprietary Security Policy
Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: April 25, 2012 Athena Smartcard Inc. Public Material may be reproduced only
