Certificate 2686 - Voltage Cryptographic Module v.5.0
intCertNum 2686
strVendorName HPE Data Security
strURL http://www.voltage.com
strAddress1 20400 Stevens Creek Blvd STE 500
strAddress2
strAddress3
strCity Cupertino
strStateProv CA
strPostalCode 95014
strCountry 95014
strContact Luther Martin
strEmail martin@hpe.com
strPhone 408-886-3255
strFax 408-886-3201
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2686
strModuleName Voltage Cryptographic Module v.5.0
strPartNumber Software Version: Version 5.0
memModuleNotes When operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 07/19/2016;08/04/2016;08/22/2016
intOverallLevel 1
memIndividualLevelNotes -Physical Security: N/A;-Mitigation of Other Attacks: N/A;-Operational Environment: CPU Intel(R) Core(TM) i7-3770 with AES-NI w/ CentOS Linux release 7.0.1406 running on Dell Optiplex 7010; CPU Intel(R) Core(TM) i7-3770 w/o AES-NI w/ CentOS Linux release 7.0.1406 running on Dell Optiplex 7010; CPU Intel Itanium 9300, model NB54000c w/ HP NonStop TNS/E J06.19.00 - OSS running on HP Integrity NonStop BladeSystem NB54000c; CPU Intel Xeon E5-2600 v2 with AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - OSS running on HP Integrity NonStop X NS7 X1; CPU Intel Itanium 9300, model NB54000c w/ HP NonStop TNS/E J06.19.00 - Guardian running HP Integrity NonStop BladeSystem NB54000c; CPU Intel Xeon E5-2600 v2 with AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - Guardian running on HP Integrity NonStop X NS7 X1; CPU Intel Xeon E5-2600 v2 w/o AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - OSS running HP Integrity NonStop X NS7 X1; CPU Intel Xeon E5-2600 v2 w/o AES-NI, model NS7 X1 w/ HP NonStop TNS/X L15.08.00 - Guardian running HP Integrity NonStop X NS7 X1; CPU Intel(R) Core(TM) i7-2600 with AES-NI w/ Windows Server 2012 R2 running on Dell Optiplex 790; CPU Intel(R) Core(TM) i7-2600 w/o AES-NI w/ Windows Server 2012 R2 running on Dell Optiplex 790 (single-user mode)
strFIPSAlgorithms ECDSA (Certs. #803, #806, #829, #845 and #846);
DSA (Certs. #1042, #1044, #1050, #1059 and #1060);
Triple-DES (Certs. #1915, #1916, #1917, #1918, #2091, #2117, #2137, #2138, #2169, #2208 and #2209);
SHS (Certs. #2791, #2792, #2793, #2794, #3131, #3166, #3210 and #3211);
AES (Certs. #3372, #3373, #3374, #3375, #3410, #3411, #3412, #3413, #3761, #3843, #3894, #3895, #3918, #4033 and #4034);
HMAC (Certs. #2455, #2461, #2493, #2528 and #2529);
RSA (Certs. #1730, #1731, #1732, #1733, #1935, #1963, #1984 and #1985);
DRBG (Certs. #796, #797, #798, #799, #1033, #1088, #1114, and #1115);
KBKDF (Certs. #63, #67, #68, #69, #76, #83, #87 and #88);
CVL (Certs. #509, #510, #511, #512, #709, #732, #754 and #755);
PBKDF (vendor affirmed);
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides 112 bits of encryption strength);
RNG;
Dual EC DRBG;
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength)
strConfiguration Multi-Chip Stand Alone
memModuleDescription The Voltage Cryptographic Module v.5.0 provides the Validated algorithms used by the HPE SecureMail, HPE SecureFile and HPE SecureData families of products.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 07/19/16 00:00:00
strLabName AEgisolve
strValidationYear 2016