Certificate 1777 - Thales e-Security keyAuthority
intCertNum 1777
strVendorName Thales e-Security Inc.
strURL http://www.thales-esecurity.com
strAddress1 900 South Pine Island Road
strAddress2 Suite 710
strAddress3
strCity Plantation
strStateProv FL
strPostalCode 33324
strCountry 33324
strContact Nathan Turajski
strEmail Nathan.Turajski@thalesesec.com
strPhone 954-888-6201
strFax
strContact2
strEmail2
strFax2
strPhone2
intCertNum 1777
strModuleName Thales e-Security keyAuthority
strPartNumber Hardware Version: 1.0;
Firmware Version: 3.0.3
memModuleNotes This module contains the embedded module IBM Java JCE FIPS 140-2 Cryptographic Module validated to FIPS 140-2 under Cert. #1081 operating in FIPS mode using IBM JVM 1.6
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL http://www.thales-esecurity.com/Products/Key Management Tools/keyAuthority.aspx
strModuleType Hardware
strValidationDate 08/07/2012
intOverallLevel 3
memIndividualLevelNotes
strFIPSAlgorithms AES (Certs. #805 and #1795);
DRBG (Cert. #128);
HMAC (Certs. #445 and #1059);
RNG (Cert. #463);
RSA (Certs. #387 and #898);
SHS (Certs. #803, #1573 and #1577)
strOtherAlgorithms Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RSA (key wrapping;
key establishment methodology provides 112 bits of encryption strength)
strConfiguration Multi-chip standalone
memModuleDescription Thales keyAuthority is a standards-based, FIPS-validated key management appliance that enables organizations to confidently manage encryption for multiple types of encrypting endpoints. The appliance manages encryption keys throughout their lifecycle to meet security policy and regulatory compliance requirements. A vendor-neutral approach ensures broad support for encryption devices.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 08/07/12 00:00:00
strLabName Leidos
strValidationYear 2012