1 Overview
The HP-UX Kernel Cryptographic Module ( HP-UX KCM ) is a common cryptographic library in HP-UX Kernel. It is a library of core cryptographic algorithms, which are used by HP-UX Kernel products.
HP-UX KCM implements FIPS 140-2 compliant algorithms for commonly used cryptographic operations such as data encryption/decryption, sign/verify, digest, HMAC, and random number generation.
HP-UX KCM is available in HP-UX Kernel as a dynamically loadable library with well-defined interfaces to invoke the crypto functions. This helps to bring modularity and standardization in the usage of crypto algorithms across the HP-UX Kernel products. HP-UX KCM is available on HP Integrity platform running HP-UX 11iv3.
HP-UX KCM is undergoing FIPS 140-2 Level 1 validation and is currently in NIST Review Pending state.
The interfaces supported by the library follows RSA Security Inc. PKCS#11 V.2.20 specification.
For more information on PKCS, see PKCS #11 v2.20: Cryptographic Token Interface Standard document.
NOTE: This link will take you outside the Hewlett-Packard (HP) Web site. HP does not control and is not responsible for information outside of HP.com.
Supported configuration
The supported configuration for HPUX-KCM is HP-UX 11i v3 for HP Integrity Servers.
Features provided in this release
This section discusses the new features available in the HP-UX KCM version 1.0.
The table below lists the FIPS 140-2 compliant algorithms, key lengths, modes, and operations implemented by HP-UX KCM 1.0.
FIPS algo | Key size | Operations | Purpose |
AES | 128, 192, and 256 Generate, Encrypt, and | Symmetric key operations (FIPS-197 |
| Mode: CBC | Decrypt | compliant) |
| | |
RSA | 2048 | Generate key pair, Sign, | Asymmetric key operations |
| | Verify, Wrap key, and | (FIPS 186-3 and PKCS#1 v1.5 compliant) |
| | Unwrap key |
| | |
SHA-2 | 256, 384, and 512 | Digest | Digest operations (FIPS 180-3 compliant) |
HMAC-SHA2 | 256, 384, and 512 | Digest (with key) | Key-Hash Message Authentication Code |
| | | (HMAC) |
RNG | | Generate random | NIST SP800-90A compliant DRBG |
HP-UX KCM also implements the following algorithms, which are required for supportability purposes even though they are not FIPS 140-2 compliant.
Non FIPS algo | Key size | Operations | Purpose |
AES | 128, 192, and 256 | Generate, Encrypt, and | Symmetric key operations |
| Mode: CFB | Decrypt | |
| | |