intCertNum |
1140 |
strVendorName |
EF Johnson Technologies |
strURL |
http://www.efjohnson.com |
strAddress1 |
1440 Corporate Drive |
strAddress2 |
|
strAddress3 |
|
strCity |
Irving |
strStateProv |
TX |
strPostalCode |
75038-2401 |
strCountry |
75038-2401 |
strContact |
John Oblak |
strEmail |
joblak@efjohnson.com |
strPhone |
507-837-5116 |
strFax |
507-837-5120 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
1140 |
strModuleName |
Johnson Encryption Machine 2 (JEM2) |
strPartNumber |
Hardware Version: 023-3900-183; Firmware Versions: 2.0 and 2.1 |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
06/25/2009;07/02/2010 |
intOverallLevel |
1 |
memIndividualLevelNotes |
|
strFIPSAlgorithms |
AES (Cert. #917); SHS (Cert. #904); HMAC (Cert. #512); DSA (Cert. #328); RNG (Cert. #526) |
strOtherAlgorithms |
AES (Cert. #917, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES MAC (AES Cert. #917, vendor affirmed; P25 AES OTAR); DES |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The EF Johnson Technologies Johnson Encryption Machine 2 (JEM2) is a cryptographic module meeting the FIPS140-2, Level 1 requirement. The JEM2 provides cryptographic operations to support Project 25 infrastructure. The JEM2 supports AES OTAR, AES, DSA, SHA-1, SHA-256, SHA-512, and HMAC FIPS Approved algorithms. |
intModuleCount |
1 |
memAdditionalNotes |
07/02/10: Added FW v2.1; Updated Security Policy. |
strFirstValidtionDate |
06/25/09 00:00:00 |
strLabName |
InfoGard |
strValidationYear |
2009 |