intCertNum |
2388 |
strVendorName |
Cisco Systems, Inc. |
strURL |
http://www.cisco.com |
strAddress1 |
170 West Tasman Dr. |
strAddress2 |
|
strAddress3 |
|
strCity |
San Jose |
strStateProv |
CA |
strPostalCode |
95134 |
strCountry |
95134 |
strContact |
Global Certification Team |
strEmail |
certteam@cisco.com |
strPhone |
|
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2388 |
strModuleName |
IOS Common Cryptographic Module (IC2M) Rel5 |
strPartNumber |
Firmware Version: Rel 5 |
memModuleNotes |
When operated in FIPS mode. No assurance of the minimum strength of generated keys |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Firmware |
strValidationDate |
05/28/2015 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Mitigation of Other Attacks: N/A ;;-Tested: Cisco ASR1K RP2 with processor Intel Xeon on IOS XE3.13; Cisco ASR1K RP1 with processor Freescale SC8548H on IOS XE3.13; Cisco ISR 2951 with processor Freescale 8752E on IOS 15.4; Cisco ISR 1921 with processor Cavium CN5020 on IOS 15.4; Cisco ISR 2921 with processor Cavium CN5220 on IOS 15.4; Cisco ISR 891 with processor MPC8358E on IOS 15.4; ESR 5940 with processor MPC8572C on IOS 15.4 |
strFIPSAlgorithms |
AES (Certs. #2783, #2817 and #3278); CVL (Certs. #252 and #253); DRBG (Cert. #481); ECDSA (Cert. #493); HMAC (Cert. #1764); KBKDF (cert. #49); RSA (Cert. #1471); SHS (Certs. #2338 and #2361); Triple-DES (Certs. #1670, #1671 and #1688) |
strOtherAlgorithms |
DES; Diffie-Hellman (CVL Cert. #252, key agreement: key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #252, key agreement: key establishment methodology provides 128 or 192 bits of encryption strength; non-compliant less than 128 bits of encryption strength); KTS (AES cert. #3278; key establishment methodology provides 128 and 256 bits of strength); HMAC-MD5; MD2; MD5; NDRNG; RC2; RC4; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); SEAL |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
05/28/15 00:00:00 |
strLabName |
Acumen |
strValidationYear |
2015 |