Certificate 1449 - Alliance Key Manager
intCertNum 1449
strVendorName Patrick Townsend Security Solutions
strURL http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/CMVPvalDBNoLink.htm
strAddress1 406 Legion Way SE
strAddress2 Suite 300
strAddress3
strCity Olympia
strStateProv WA
strPostalCode 98501
strCountry 98501
strContact Paul Ohmart
strEmail paul.ohmart@patownsend.com
strPhone 360-357-8971
strFax
strContact2 Patrick Townsend
strEmail2 patrick.townsend@patownsend.com
strFax2
strPhone2 800-357-1019
intCertNum 1449
strModuleName Alliance Key Manager
strPartNumber Software Version: 2.0.0
memModuleNotes When operated with the Red Hat Enterprise Linux 5 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1320 operating in FIPS mode (approved algorithms retested on listed operating environment)
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf][txt]
strPURL
strModuleType Software
strValidationDate 11/15/2010
intOverallLevel 1
memIndividualLevelNotes -Operational Environment: Tested as meeting Level 1 with rPath Linux, Version 2.6.29 (single-user mode)
strFIPSAlgorithms AES (Certs. #1245 and #1486);
RNG (Certs. #692 and #810);
SHS (Certs. #1144 and #1342);
HMAC (Certs. #728 and #875);
RSA (Cert. #729)
strOtherAlgorithms MD5, RSA (key wrapping;
key establishment methodology provides 112 bits of encryption strength;
non-compliant less than 112 bits of encryption strength)
strConfiguration Multi-chip standalone
memModuleDescription The Alliance Key Manager implements a client/server interface for key administration. The user application has the client role, and the key manager has the server role. The user opens a secure connection to the key server, sends an administrative request (create a key, change a key, etc.), receives a response from the server, and the session is disconnected.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 11/15/10 00:00:00
strLabName atsec
strValidationYear 2010