intCertNum |
2505 |
strVendorName |
Cisco Systems, Inc. |
strURL |
http://www.cisco.com |
strAddress1 |
170 West Tasman Drive |
strAddress2 |
|
strAddress3 |
|
strCity |
San Jose |
strStateProv |
CA |
strPostalCode |
95134 |
strCountry |
95134 |
strContact |
Global Certification Team |
strEmail |
certteam@cisco.com |
strPhone |
|
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2505 |
strModuleName |
Cisco FIPS Object Module |
strPartNumber |
Software Version: 6.0 |
memModuleNotes |
When installed, initialized and configured as specified in the Security Policy Section 4.2 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Software |
strValidationDate |
12/21/2015 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Physical Security: N/A;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 without Octeon; Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 with Octeon; Linux 2.6 running on an Intel Xeon on a Cisco UCS C22 M3; Android v4.4 running on a Qualcomm Snapdragon Pro APQ8064 ARMv7 on a Google Nexus 4; Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 without PAA; Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 with PAA; FreeBSD 9.2 running on an Intel Xeon on a Cisco UCS C200 M2 (single-user mode) |
strFIPSAlgorithms |
AES (Certs. #3404 and #3405); CVL (Certs. #504, #505, #506 and #507); DRBG (Certs. #817 and #818); DSA (Certs. #961 and #962); ECDSA (Certs. #678 and #679); HMAC (Certs. #2172 and #2173); KBKDF (Certs. #52 and #53); RSA (Certs. #1743 and #1744); SHS (Certs. #2817 and #2818); Triple-DES (Certs. #1926 and #1927) |
strOtherAlgorithms |
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 219 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
12/21/15 00:00:00 |
strLabName |
CGI |
strValidationYear |
2015 |