Certificate 2643 - nShield F2 500+, nShield F2 1500+ and nShield F2 6000+
intCertNum 2643
strVendorName Thales e-Security Inc.
strURL http://www.thales-esecurity.com
strAddress1 900 South Pine Island Road
strAddress2 Suite 710
strAddress3
strCity Plantation
strStateProv FL
strPostalCode 33324
strCountry 33324
strContact sales@thalesesec.com
strEmail sales@thalesesec.com
strPhone 888-744-4976
strFax
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2643
strModuleName nShield F2 500+, nShield F2 1500+ and nShield F2 6000+
strPartNumber Hardware Versions: nC3423E-500, nC3423E-1K5 and nC3423E-6K0, Build Standard N;
Firmware Version: 2.61.2-2
memModuleNotes When operated in FIPS mode and initialized to Overall Level 2 per Security Policy. The protocol TLS shall not be used when operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Hardware
strValidationDate 05/13/2016
intOverallLevel 2
memIndividualLevelNotes -Roles, Services, and Authentication: Level 3;-Physical Security: Level 3;-EMI/EMC: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: N/A
strFIPSAlgorithms AES (Certs. #3420 and #3446);
CVL (Certs. #516 and #532);
DRBG (Cert. #825);
DSA (Cert. #964);
ECDSA (Cert. #695);
HMAC (Cert. #2178);
KBKDF (Cert. #56);
KTS (AES Cert. #3446;
key establishment methodology provides between 128 and 256 bits of encryption strength);
RSA (Cert. #1752);
SHS (Cert. #2826);
Triple-DES (Cert. #1931);
Triple-DES MAC (Triple-DES Cert. #1931, vendor affirmed)
strOtherAlgorithms ARC4;
Aria;
Camellia;
CAST-256;
DES;
Diffie-Hellman (CVL Cert. #516, key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (CVL Cert. #532, key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
ECMQV (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
El-Gamal;
HAS-160;
HMAC-MD5;
HMAC-RIPEMD160;
HMAC-Tiger;
KCDSA;
MD5;
NDRNG;
RIPEMD-160;
RSA (encrypt/decrypt);
RSA (key wrapping;
key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
SEED;
Tiger;
TLS KDF (non-compliant);
Triple-DES (Cert. #1931, key wrapping;
key establishment methodology provides 112 bits of encryption strength;
non-compliant less than 112 bits of encryption strength)
strConfiguration Multi-Chip Embedded
memModuleDescription The nShield modules: nShield F2 500+, nShield F2 1500+, nShield F2 6000+ are tamper evident and tamper responsive Hardware Security Modules which provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application. The units are identical in operation and only vary in the processing speed.
intModuleCount 3
memAdditionalNotes
strFirstValidtionDate 05/13/16 00:00:00
strLabName Computer Sciences
strValidationYear 2016