intCertNum |
1307 |
strVendorName |
CipherOptics Inc. |
strURL |
http://www.cipheroptics.com |
strAddress1 |
701 Corporate Center Drive |
strAddress2 |
Suite 360 |
strAddress3 |
|
strCity |
Raleigh |
strStateProv |
NC |
strPostalCode |
27607 |
strCountry |
27607 |
strContact |
Ed Finn |
strEmail |
ed.finn@cipheroptics.com |
strPhone |
412-262-2571 x102 |
strFax |
412-262-2574 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
1307 |
strModuleName |
CEP100, CEP100-XSA and CEP1000 |
strPartNumber |
Hardware Versions: [CEP100, A], [CEP100-XSA, A] and [CEP1000, A]; Firmware Version: 1.4 |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
05/10/2010;06/14/2010 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Roles, Services, and Authentication: Level 3;-EMI/EMC: Level 3;-Design Assurance: Level 3 |
strFIPSAlgorithms |
Triple-DES (Certs. #482, #667 and #873); AES (Certs. #465, #762 and #1210); SHS (Certs. #768, #769 and #1114); HMAC (Certs. #416, #417 and #705); RSA (Cert. #582); DSA (Cert. #400); RNG (Cert. #672) |
strOtherAlgorithms |
MD5; HMAC-MD5; Diffie-Hellman (key agreement: key establishment methodology provides 97 bits of encryption strength; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 to 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The CipherOptics CEP encryptors are high performance, integrated encryption appliances that offers full line rate Ethernet Frame encryption for 10Mbps Ethernet transports. Housed in a tamper evident chassis, the CipherOptics CEP has two functional 10BaseT Ethernet ports used for traffic. Traffic on the CEP local port is received from and transmitted to the trusted network in the clear, while traffic on the CEP's remote port has security processing applied to it. Security processing can be data confidentiality, data integrity and data authentication. |
intModuleCount |
1 |
memAdditionalNotes |
06/14/10: Changed POC1 |
strFirstValidtionDate |
05/10/10 00:00:00 |
strLabName |
DOMUS |
strValidationYear |
2010 |