Page 45
Security Target, Version 3.9 | March 18, 2008 |
| |
6.1.2 Cryptographic Support
The TOE’s cryptographic functionality is provided by a FIPS 140-2-validated cryptographic module. All modules have received either a Level 1 or Level 2 FIPS 140-2 validation. Table 8 below indicates the modules and the validation levels achieved.
Table 8 - FIPS Validated Modules
| Validation | | Modules | | FIPS 140-2 Certificate # |
| | |
| | | | | |
| | | VPN Router 1750, 2700, 2750 and 5000 with Hardware | 1068 |
| | | Accelerator |
| Hardware modules | | | |
| | | | |
| | | | |
| FIPS 140-2 validated | | VPN Router 1750, 2700, 2750 and 5000 with VPN Router Security | 1073 |
| at level 2 | | Accelerator |
| | | |
| | | | |
| | | Nortel VPN Router 600, 1750, 2700, 2750 and 5000 | 1066 |
| | | | | |
| Hardware modules | | | | |
| FIPS 140-2 validated | | Nortel VPN Router 1010, 1050 and 1100 | 1067 |
| at level 1 | | | | |
| | | | | |
| Software module | | | | |
| being validated at | | VPN Client Software | 1032 |
| level 1 of FIPS 140-2: | | | | |
| | | | | |
The TOE’s cryptographic module implements and utilizes the following FIPS-validated cryptographic algorithms:
Table 9 - FIPS-Validated Cryptographic Algorithms
| Algorithm | | Key Size(s) (bits) | | Validated Against | | FIPS Certificate # |
| | | |
| | | |
| | | | | |
| 3DES | 168 | | FIPS 46-3 | 641, 642, 644 |
| | | | | | |
| AES | 128, | 256 | | FIPS 197 | 718, 719, 721 |
| | | | | | |
| RSA5 | 1024, | 2048 | | FIPS 186-2 | 338, 339 |
| | | | | | |
| SHA-1 | | N/A | | FIPS 180-2 | 738, 739, 740 |
| | | | | |
| HMAC-SHA-1 | 160 | | FIPS 1986 | 387, 388, 389 |
| | | | | | | | |
The TOE generates RSA keys for signature generation and verification. During the key generation process, all weak keys are discarded. The resultant strong RSA keys are used to perform key agreement and authentication in accordance with the Diffie-Hellman and IKE protocols.
The TOE performs encryption and decryption using the 3DES and AES algorithms. The TOE implements the HMAC-SHA-1 algorithm in order to perform data origin authentication and data integrity checks upon encrypted packets entering the TOE. The TOE implements SHA-1 algorithm in order to perform data integrity checks upon encrypted packets entering the TOE.
The TOE destroys keys when they are no longer needed by “zeroizing” them. Zeroization is performed by overwriting the memory location containing the keys with zeros before marking the memory location as being free
5 | Via the RSA BSAFE library. | |
6 | FIPS 198 is equivalent to RFC 2104. | |
| |
Nortel VPN Router v7.05 and Client Workstation v7.11 | Page 45 of 67 |
| © 2008 Nortel Networks | |
Contents
Nortel Networks Corsec Security, Inc
Version Modification Date Modified By Description of Changes
Revision History
Table of Contents
Table of Tables
Table of Figures
Protection Profile Claims
Rationale
Purpose
Security Target Introduction
Security Target, TOE and CC Identification and Conformance
ST, TOE, and CC Identification and Conformance
Conventions
Conventions, Acronyms, and Terminology
Terminology
Terminology
Primary Admin password
TOE Description
Product Type
Product Description
Branch Office Deployment Configuration of the TOE
Physical Boundary
TOE Boundaries and Scope
TOE Environment
Logical Boundary
Enterprise
World
Security Audit
Cryptographic Support
User Data Protection
Security Management
Identification and Authentication
Protection of the TOE Security Functions
Trusted Path/Channels
Excluded TOE Functionality
TOE Security Environment
Assumptions
Threats to Security
Threats Addressed by the TOE Environment
Threats Addressed by the TOE
Security Objectives for the TOE
Security Objectives
IT Security Objectives
Security Objectives for the Environment
Non-IT Security Objectives
OE.TIME
TOE Security Functional Requirements
IT Security Requirements
TOE Security Functional Requirements
ST Operation
Description ST Operation
FAUGEN.1 Audit Data Generation
Class FAU Security Audit
FAUSAR.1 Audit review
Auditable Events
Dependencies FAUGEN.1 Audit data generation
FCSCKM.1a Cryptographic key generation Diffie-Hellman
Class FCS Cryptographic Support
FCSCKM.1b Cryptographic key generation RSA
FCSCKM.4 Cryptographic key destruction
FCSCOP.1b Cryptographic operation authentication
FCSCOP.1d Cryptographic operation random number generation
FCSCOP.1e Cryptographic operation hashing
Security Target, Version March 18
FDPACF.1 Security attribute based access control
FDPACC.2 Complete access control
Class FDP User Data Protection
FDPIFC.2a Complete information flow control VPN
FDPIFF.1a Simple security attributes VPN
FDPIFC.2b Complete information flow control Firewall
FDPIFF.1b Simple security attributes Firewall
FDPUIT.1 Data exchange integrity
FDPUCT.1 Basic data exchange confidentiality
FDPUCT.1.1
FDPUIT.1.1
FIAUAU.1 Timing of authentication
Class FIA Identification and Authentication
FIAUAU.5 Multiple authentication mechanisms
FIAUID.2 User identification before any action
Dependencies No dependencies
FMTMOF.1a Management of security functions behaviour
Class FMT Security Management
FMTMOF.1b Management of security functions behaviour
FMTMSA.1a Management of security attributes
FMTMSA.2 Secure security attributes
FMTMSA.1c Management of security attributes
FMTMSA.3a Static attribute initialisation
FMTMSA.2.1
FMTMSA.3b Static attribute initialisation
FMTSMF.1 Specification of Management Functions
FMTMSA.3c Static attribute initialisation
FMTSMR.1 Security roles
FMTSMR.1.2
FPTTST.1 TSF testing
FPTAMT.1 Abstract machine testing
Class FPT Protection of the TSF
FPTRPL.1 Replay detection
FTPTRP.1 Trusted path
Class FTP Trusted Path/Channels
FTPTRP.1.1
FTPTRP.1.2
FPTRVM.1 Non-bypassability of the TSP
Security Functional Requirements on the IT Environment
FPTSEP.1 TSF domain separation
FPTSTM.1 Reliable time stamps
Security Target, Version 3.9March 18
Assurance Requirements
Assurance Components
Assurance Requirements
TOE Security Functions
TOE Summary Specification
TOE Security
Description Function
Security Audit
Configuration Log
Accounting Logs
Security Log
Event Log
System Log
Fips Validated Modules
Cryptographic Support
FIPS-Validated Cryptographic Algorithms
Validation Modules Fips 140-2 Certificate #
User Data Protection
Security Management
Identification and Authentication
Power-Up Self-Tests
Protection of the TOE Security Functions
Conditional Self-Tests
Trusted Path/Channels
TOE Security Assurance Measures
TOE Security Functional Requirements Satisfied FTPTRP.1
Assurance Assurance Measure Component
Augmentation to EAL 4+ assurance level
Protection Profile Reference
Protection Profile Claims
Security Objectives Rationale
Rationale
Relationship of Security Threats to Objectives
TOE Objectives Environmental Objectives Non-IT
Hack
Certificate
OE.CERTIFICATE
Security Functional Requirements Rationale
Objectives Requirements
Relationship of Security Requirements to Objectives
Env
Functions and data
FMTMSA.3a,b,c
Able to access such functionality
Integrity
Reject packets based on their attributes
Rationale for Strength of Function
Security Assurance Requirements Rationale
Dependency Rationale
Functional Requirements Dependencies
FCSCOP.1
TOE Summary Specification Rationale
Configuration Management
Secure Delivery and Operation
Development
Guidance Documentation
Life Cycle Support Documents
Tests
Vulnerability and TOE Strength of Function Analyses
Strength of Function
Acronyms
Acronyms
Acronym Definition
DoD
SHA