Cryptographic Key Management
The modules implement the following FIPS-approved algorithms:
Type | Algorithm | Standard | Certificate Number |
Symmetric | AES (CBC) | FIPS 197 | Cert. #48, #106, #107 |
| FIPS | Cert. #158, #218, #219, | |
| ECB) |
| #220 |
| DES (CBC) | FIPS | Cert. #204, #238, #239, |
|
|
| #240 |
Asymmetric | DSA | FIPS | Cert. #97 |
|
| Notice 1 |
|
| RSA Digital Signature | PKCS #1 | Vendor affirmed |
Hash function | FIPS | Cert. #143, #197, #198, | |
|
|
| #199 |
MAC | HMAC | FIPS 198 | Cert. #143, #197, #198, |
|
|
| #199; vendor affirmed |
PRNG | Appendix 3.1 (Algorithm | FIPS | N/A |
| 1) for computing DSA | Notice 1 |
|
| keys |
|
|
| Appendix 3.1 for |
|
|
| general purpose |
|
|
Table 7 –
Note: DES should be used for legacy purposes only.
The modules implement the following
•HMAC MD5
•MD5
•MD4
•
•CAST
•Blowfish
•Twofish
•ARCfour
•
Cryptographic algorithms are implemented in software and in hardware by
© Copyright 2003 Enterasys Networks Page 16 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.