intCertNum |
899 |
strVendorName |
IBM Corporation |
strURL |
http://www.ibm.com |
strAddress1 |
Nymøllevej 91 |
strAddress2 |
|
strAddress3 |
|
strCity |
Lyngby |
strStateProv |
|
strPostalCode |
DK-2800 |
strCountry |
DK-2800 |
strContact |
Crypto Competence Center Copenhagen |
strEmail |
cccc@dk.ibm.com |
strPhone |
+45-4523-4441 |
strFax |
+45-4523-6802 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
899 |
strModuleName |
IBM CryptoLite for C |
strPartNumber |
Software Version: 4.5 |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
http://www.ibm.com/security/products/cryptotools.shtml |
strModuleType |
Software |
strValidationDate |
01/16/2008 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Cryptographic Module Specification: Level 3;;-Operational Environment: Tested as meeting Level 1 with Windows Vista Ultimate; Red Hat Enterprise Linux v4 (single-user mode) |
strFIPSAlgorithms |
AES (Cert. #615); Triple-DES (Cert. #585); SHS (Cert. #663); DSA (Cert. #238); RSA (Cert. #286); RNG (Cert. #350); HMAC (Cert. #318); ECDSA (Cert. #66) |
strOtherAlgorithms |
DES; CAST-5; CAST-6; RC2; ArcFour; Blowfish; Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ECDH (key agreement: key establishment methodology provides 112 to 256 bits of encryption strength; non-compliant less than 112 bits of encryptino strength); RSA (key wrapping; key establishment methodology provides 112 to 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD5; Whirlpool; HMAC MD5 |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
IBM CryptoLite is a C software package providing advanced cryptographic services in a very small footprint. CryptoLite supports public key encryption, digital signatures, symmetric ciphers, hash functions, message authentication codes, and other cryptographic algorithms through a simple programming interface. There are no runtime dependencies and the code has been optimized for high performance. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
01/16/08 00:00:00 |
strLabName |
Leidos |
strValidationYear |
2008 |