intCertNum |
2557 |
strVendorName |
Senetas Corporation Ltd. and SafeNet Inc. |
strURL |
http://www.senetas.com |
strAddress1 |
312 Kings Way |
strAddress2 |
|
strAddress3 |
|
strCity |
South Melbourne |
strStateProv |
Victoria |
strPostalCode |
3205 |
strCountry |
3205 |
strContact |
John Weston |
strEmail |
john.weston@senetas.com |
strPhone |
+61 3 9868 4555 |
strFax |
+61 3 9821 4899 |
strContact2 |
Laurie Mack |
strEmail2 |
SecurityCertifications@safenet-inc.com |
strFax2 |
613-723-5079 |
strPhone2 |
613-221-5065 |
intCertNum |
2557 |
strModuleName |
CN Series Ethernet Encryptors |
strPartNumber |
Firmware Versions: 2.6.1 and 2.6.2 |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
http://www.senetas.com/encryptors/layer-2-encryptors/ |
strModuleType |
Hardware |
strValidationDate |
02/11/2016;04/11/2016 |
intOverallLevel |
3 |
memIndividualLevelNotes |
-Operational Environment: N/A |
strFIPSAlgorithms |
AES (Certs. #3335, #3342 and #3343); CVL (Cert. #489); DRBG (Cert. #777); ECDSA (Cert. #659); HMAC (Cert. #2126); KAS (Cert. #56); RSA (Cert. #1725); SHS (Cert. #2770); Triple-DES (Cert. #1905) |
strOtherAlgorithms |
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); NDRNG |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The CN4010 and CN6010 are high-speed hardware encryption modules that secure data over twisted-pair Ethernet and optical networks. The modules support data rates to 1Gb/s and 100Mb/s and 10Mb/s modes. The CN6010 is additionally equipped with pluggable SFPs to support a variety of optical network interfaces. Data privacy is provided by FIPS approved AES CFB and CTR algorithms as well as GCM for applications that demand authentication. Additional transmission security is provided via TRANSEC capability which can be used to remove patterns in network traffic and prevent traffic analysis. |
intModuleCount |
4 |
memAdditionalNotes |
Updated firmware to fix bug and improve performance. The Security Policy reflects this change. |
strFirstValidtionDate |
02/11/16 00:00:00 |
strLabName |
Computer Sciences |
strValidationYear |
2016 |